Sciweavers

2084 search results - page 400 / 417
» Knowledge Exploitation from the Web
Sort
View
ICS
2009
Tsinghua U.
14 years 3 months ago
MPI-aware compiler optimizations for improving communication-computation overlap
Several existing compiler transformations can help improve communication-computation overlap in MPI applications. However, traditional compilers treat calls to the MPI library as ...
Anthony Danalis, Lori L. Pollock, D. Martin Swany,...
CIKM
2009
Springer
14 years 3 months ago
Completing wikipedia's hyperlink structure through dimensionality reduction
Wikipedia is the largest monolithic repository of human knowledge. In addition to its sheer size, it represents a new encyclopedic paradigm by interconnecting articles through hyp...
Robert West, Doina Precup, Joelle Pineau
CASES
2009
ACM
14 years 3 months ago
CheckerCore: enhancing an FPGA soft core to capture worst-case execution times
Embedded processors have become increasingly complex, resulting in variable execution behavior and reduced timing predictability. On such processors, safe timing specifications e...
Jin Ouyang, Raghuveer Raghavendra, Sibin Mohan, Ta...
KCAP
2009
ACM
14 years 3 months ago
Sharing and reusing aligned ontologies with cupboard
This demo presents the Cupboard online system for sharing and reusing ontologies linked together with alignments, and that are attached to rich metadata and reviews. Categories an...
Mathieu d'Aquin, Jérôme Euzenat, Chan...
ACSAC
2008
IEEE
14 years 3 months ago
Systematic Signature Engineering by Re-use of Snort Signatures
Most intrusion detection systems apply the misuse detection approach. Misuse detection compares recorded audit data with predefined patterns denoted as signatures. A signature is ...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...