Sciweavers

2663 search results - page 324 / 533
» How to Choose a Timing Model
Sort
View
149
Voted
SC
2009
ACM
15 years 10 months ago
FALCON: a system for reliable checkpoint recovery in shared grid environments
In Fine-Grained Cycle Sharing (FGCS) systems, machine owners voluntarily share their unused CPU cycles with guest jobs, as long as the performance degradation is tolerable. For gu...
Tanzima Zerin Islam, Saurabh Bagchi, Rudolf Eigenm...
150
Voted
DEXA
2009
Springer
175views Database» more  DEXA 2009»
15 years 10 months ago
RoK: Roll-Up with the K-Means Clustering Method for Recommending OLAP Queries
Dimension hierarchies represent a substantial part of the data warehouse model. Indeed they allow decision makers to examine data at different levels of detail with On-Line Analyt...
Fadila Bentayeb, Cécile Favre
135
Voted
ICPADS
2005
IEEE
15 years 9 months ago
A Two-Level Strategy for Topology Control in Wireless Sensor Networks
— This paper presents a two-level strategy for topology control in wireless sensor networks. The energy saving methods in most of the existing research work can be categorized in...
Bolian Yin, Hongchi Shi, Yi Shang
DEBS
2003
ACM
15 years 9 months ago
The design of a configurable, extensible and dynamic notification service
Publish/subscribe infrastructures, specifically notification servers, are used in a large spectrum of distributed applications as their basic communication and integration infrast...
Roberto Silveira Silva Filho, Cleidson R. B. de So...
MICRO
2002
IEEE
164views Hardware» more  MICRO 2002»
15 years 8 months ago
A quantitative framework for automated pre-execution thread selection
Pre-execution attacks cache misses for which conventional address-prediction driven prefetching is ineffective. In pre-execution, copies of cache miss computations are isolated fr...
Amir Roth, Gurindar S. Sohi