Sciweavers

1016 search results - page 23 / 204
» Explore or Exploit
Sort
View
TBILLC
2005
Springer
14 years 2 months ago
Towards a Cross-Linguistic Production Data Archive: Structure and Exploration
The present paper presents the structure of a cross-linguistic database of production data. The database contains annotated texts collected from a sample of fifteen different langu...
Michael Götze, Stavros Skopeteas, Torsten Rol...
MDM
2009
Springer
269views Communications» more  MDM 2009»
14 years 3 months ago
R-U-In? - Exploiting Rich Presence and Converged Communications for Next-Generation Activity-Oriented Social Networking
—With the growing popularity of social networking, traditional Internet Service Providers (ISPs) and Telecom operators have both started exploring new opportunities to boost thei...
Nilanjan Banerjee, Dipanjan Chakraborty, Koustuv D...
IMC
2005
ACM
14 years 2 months ago
Exploiting Underlying Structure for Detailed Reconstruction of an Internet-scale Event
Network “telescopes” that record packets sent to unused blocks of Internet address space have emerged as an important tool for observing Internet-scale events such as the spre...
Abhishek Kumar, Vern Paxson, Nicholas Weaver
ASPLOS
2006
ACM
14 years 22 days ago
SlicK: slice-based locality exploitation for efficient redundant multithreading
Transient faults are expected a be a major design consideration in future microprocessors. Recent proposals for transient fault detection in processor cores have revolved around t...
Angshuman Parashar, Anand Sivasubramaniam, Sudhanv...
TON
2012
11 years 11 months ago
Exploiting Data Fusion to Improve the Coverage of Wireless Sensor Networks
Abstract—Wireless sensor networks (WSNs) have been increasingly available for critical applications such as security surveillance and environmental monitoring. An important perfo...
Rui Tan, Guoliang Xing, Benyuan Liu, Jianping Wang...