Sciweavers

805 search results - page 76 / 161
» Modeling the performance of algorithms on flash memory devic...
Sort
View
DAC
2010
ACM
13 years 9 months ago
Instruction cache locking using temporal reuse profile
The performance of most embedded systems is critically dependent on the average memory access latency. Improving the cache hit rate can have significant positive impact on the per...
Yun Liang, Tulika Mitra
SC
2009
ACM
14 years 1 months ago
Plasma fusion code coupling using scalable I/O services and scientific workflows
In order to understand the complex physics of mother nature, physicist often use many approximations to understand one area of physics and then write a simulation to reduce these ...
Norbert Podhorszki, Scott Klasky, Qing Liu, Cipria...
MASCOTS
2008
13 years 10 months ago
Evaluating the Effectiveness of Information Extraction in Real-World Storage Management
As storage deployments within enterprises continue to grow, there is an increasing need to simplify and automate. Existing tools for automation rely on extracting information in t...
Aameek Singh, Sandeep Uttamchandani, Yin Wang
ICMCS
2005
IEEE
92views Multimedia» more  ICMCS 2005»
14 years 2 months ago
Striping Delay-Sensitive Packets Over Multiple Bursty Wireless Channels
Multi-homed mobile devices have multiple wireless communication interfaces, each connecting to the Internet via a low speed and bursty WAN link such as a cellular link. We propose...
Gene Cheung, Puneet Sharma, Sung-Ju Lee
SAC
2010
ACM
14 years 3 months ago
Referrer graph: a low-cost web prediction algorithm
This paper presents the Referrer Graph (RG) web prediction algorithm as a low-cost solution to predict next web user accesses. RG is aimed at being used in a real web system with ...
B. de la Ossa, Ana Pont, Julio Sahuquillo, Jos&eac...