Sciweavers

1016 search results - page 74 / 204
» Explore or Exploit
Sort
View
SEMWEB
2005
Springer
14 years 2 months ago
Semantically Rich Recommendations in Social Networks for Sharing, Exchanging and Ranking Semantic Context
Recommender algorithms have been quite successfully employed in a variety of scenarios from filtering applications to recommendations of movies and books at Amazon.com. However, a...
Stefania Ghita, Wolfgang Nejdl, Raluca Paiu
ICWE
2010
Springer
14 years 1 months ago
Ranking the Linked Data: The Case of DBpedia
The recent proliferation of crowd computing initiatives on the web calls for smarter methodologies and tools to annotate, query and explore repositories. There is the need for scal...
Roberto Mirizzi, Azzurra Ragone, Tommaso Di Noia, ...
FPL
1999
Springer
147views Hardware» more  FPL 1999»
14 years 1 months ago
Synthia: Synthesis of Interacting Automata Targeting LUT-based FPGAs
This paper details the development, implementation, and results of Synthia, a system for the synthesis of Finite State Machines (FSMs) to field-programmable logic. Our approach us...
George A. Constantinides, Peter Y. K. Cheung, Wayn...
HOTOS
1993
IEEE
14 years 1 months ago
xFS: A Wide Area Mass Storage File System
The current generation of le systems are inadequate in facing the new technological challenges of wide area networks and massive storage. xFS is a prototype le system we are devel...
Randolph Y. Wang, Thomas E. Anderson
ASPLOS
1992
ACM
14 years 1 months ago
Access Normalization: Loop Restructuring for NUMA Compilers
: In scalable parallel machines, processors can make local memory accesses much faster than they can make remote memory accesses. In addition, when a number of remote accesses must...
Wei Li, Keshav Pingali