Sciweavers

1196 search results - page 165 / 240
» High Availability and Scalability Support for Web Applicatio...
Sort
View
CONSTRAINTS
2008
182views more  CONSTRAINTS 2008»
13 years 9 months ago
Constraint Programming in Structural Bioinformatics
Bioinformatics aims at applying computer science methods to the wealth of data collected in a variety of experiments in life sciences (e.g. cell and molecular biology, biochemistry...
Pedro Barahona, Ludwig Krippahl
PAKDD
2009
ACM
170views Data Mining» more  PAKDD 2009»
14 years 6 months ago
Discovering Periodic-Frequent Patterns in Transactional Databases.
Since mining frequent patterns from transactional databases involves an exponential mining space and generates a huge number of patterns, efficient discovery of user-interest-based...
Byeong-Soo Jeong, Chowdhury Farhan Ahmed, Syed Kha...
ICCCN
2007
IEEE
14 years 3 months ago
k-hop Backbone Formation in Ad Hoc Networks
—Several recent research activities have started to recognize the relevant role of k-hop clustering in Mobile Ad hoc NETworks (MANET) to effectively support many relevant tasks, ...
Paolo Bellavista, Eugenio Magistretti
PERCOM
2007
ACM
14 years 8 months ago
Dynamic Context Bindings in Pervasive Middleware
Context-awareness (CA) enables the development of personalized pervasive services. Current context-aware infrastructures focus on middleware solutions to support acquisition, usag...
Tom Broens, Marten van Sinderen, Aart van Halteren...
ISCA
2011
IEEE
240views Hardware» more  ISCA 2011»
13 years 24 days ago
Virtualizing performance asymmetric multi-core systems
Performance-asymmetric multi-cores consist of heterogeneous cores, which support the same ISA, but have different computing capabilities. To maximize the throughput of asymmetric...
Youngjin Kwon, Changdae Kim, Seungryoul Maeng, Jae...