Sciweavers

1852 search results - page 9 / 371
» From Bi-ideals to Periodicity
Sort
View
EUROPAR
2005
Springer
14 years 1 months ago
The Periodic-Linear Model of Program Behavior Capture
Abstract. Understanding and controlling program behavior is a challenging objective for the design of advanced compilers and critical system development. In this paper, we propose ...
Philippe Clauss, Bénédicte Kenmei, J...
ICCS
2004
Springer
14 years 26 days ago
Karhunen-Loeve Representation of Periodic Second-Order Autoregressive Processes
In dynamic data driven applications modeling accurately the uncertainty of various inputs is a key step of the process. In this paper, we first review the basics of the Karhunen-L...
Didier Lucor, Chau-Hsing Su, George E. Karniadakis
MONET
2010
148views more  MONET 2010»
13 years 6 months ago
REP: Location Privacy for VANETs Using Random Encryption Periods
It is well recognized that security is vital for reliable operation of vehicular ad-hoc networks (VANETs). Location privacy is one of the main security challenges in VANETs, which ...
Albert Wasef, Xuemin (Sherman) Shen
KDD
2006
ACM
127views Data Mining» more  KDD 2006»
14 years 8 months ago
Recommendation method for extending subscription periods
Online stores providing subscription services need to extend user subscription periods as long as possible to increase their profits. Conventional recommendation methods recommend...
Tomoharu Iwata, Kazumi Saito, Takeshi Yamada
IPPS
2005
IEEE
14 years 1 months ago
Performance Implications of Periodic Checkpointing on Large-Scale Cluster Systems
Large-scale systems like BlueGene/L are susceptible to a number of software and hardware failures that can affect system performance. Periodic application checkpointing is a commo...
Adam J. Oliner, Ramendra K. Sahoo, José E. ...