Sciweavers

2095 search results - page 370 / 419
» Modeling the Effects of Contention on the Performance of Het...
Sort
View
ENTCS
2002
145views more  ENTCS 2002»
13 years 8 months ago
Combining Monitors for Runtime System Verification
Runtime verification permits checking system properties that cannot be fully verified off-line. This is particularly true when the system includes complex third-party components, ...
Joshua Levy, Hassen Saïdi, Tomás E. Ur...
PE
2002
Springer
118views Optimization» more  PE 2002»
13 years 8 months ago
Procedures and tools for analysis of network traffic measurements
We present procedures and tools for the analysis of network traffic measurements. The tools consist of stand-alone 1 modules that implement advanced statistical analysis procedure...
Costas Courcoubetis, Vasilios A. Siris
COLING
2010
13 years 3 months ago
Discriminative Induction of Sub-Tree Alignment using Limited Labeled Data
We employ Maximum Entropy model to conduct sub-tree alignment between bilingual phrasal structure trees. Various lexical and structural knowledge is explored to measure the syntac...
Jun Sun, Min Zhang, Chew Lim Tan
CORR
2011
Springer
190views Education» more  CORR 2011»
13 years 14 days ago
Doubly Robust Smoothing of Dynamical Processes via Outlier Sparsity Constraints
Abstract—Coping with outliers contaminating dynamical processes is of major importance in various applications because mismatches from nominal models are not uncommon in practice...
Shahrokh Farahmand, Georgios B. Giannakis, Daniele...
MOBISYS
2004
ACM
14 years 8 months ago
NWSLite: A Light-Weight Prediction Utility for Mobile Devices
Computation off-loading, i.e., remote execution, has been shown to be effective for extending the computational power and battery life of resource-restricted devices, e.g., hand-h...
Selim Gurun, Chandra Krintz, Richard Wolski