Sciweavers

529 search results - page 74 / 106
» Laws of Pattern Composition
Sort
View
IPPS
2005
IEEE
14 years 2 months ago
On the Scalability of Centralized Control
Scalability of clusters and MPPs is typically discussed in terms of limits on growth: something which grows at a rate of O(log p) (where p is the number of processors) is said to ...
Dror G. Feitelson
INFOCOM
2003
IEEE
14 years 2 months ago
Asymptotic Insensitivity of Least-Recently-Used Caching to Statistical Dependency
Abstract— We investigate a widely popular Least-RecentlyUsed (LRU) cache replacement algorithm with semi-Markov modulated requests. Semi-Markov processes provide the flexibility...
Predrag R. Jelenkovic, Ana Radovanovic
WASA
2009
Springer
186views Algorithms» more  WASA 2009»
14 years 1 months ago
Utopia Providing Trusted Social Network Relationships within an Un-trusted Environment
Abstract. This paper introduces an unobtrusive method and distributed solution set to aid users of on-line social networking sites, by creating a trusted environment in which every...
William Gauvin, Benyuan Liu, Xinwen Fu, Jie Wang
KDD
1994
ACM
113views Data Mining» more  KDD 1994»
14 years 1 months ago
Exploration of Simulation Experiments by Discovery
: Weexemplify in this paper, howa discovery system is applied to the analysis of simulation experimentsin practical political planning, andshowwhatkind of newknowledgecan be discov...
Willi Klösgen
USAB
2008
13 years 10 months ago
Challenges in the Development and Evaluation of Immersive Digital Educational Games
In this paper, we describe a conceptual framework and address the related issues and solutions in the identification of three major challenges for the development and evaluation of...
Effie Lai-Chong Law, Michael D. Kickmeier-Rust, Di...