Sciweavers

12897 search results - page 2496 / 2580
» Multi-Torrent: A Performance Study
Sort
View
MICRO
1996
IEEE
97views Hardware» more  MICRO 1996»
14 years 2 months ago
Modulo Scheduling of Loops in Control-intensive Non-numeric Programs
Much of the previous work on modulo scheduling has targeted numeric programs, in which, often, the majority of the loops are well-behaved loop-counter-based loops without early ex...
Daniel M. Lavery, Wen-mei W. Hwu
SIGCOMM
1996
ACM
14 years 2 months ago
Removal Policies in Network Caches for World-Wide Web Documents
World-Wide Web proxy servers that cache documents can potentially reduce three quantities: the number of requests that reach popular servers, the volume of network trac resulting ...
Marc Abrams, Charles R. Standridge, Ghaleb Abdulla...
SIGMOD
1996
ACM
151views Database» more  SIGMOD 1996»
14 years 2 months ago
BIRCH: An Efficient Data Clustering Method for Very Large Databases
Finding useful patterns in large datasets has attracted considerable interest recently, and one of the most widely st,udied problems in this area is the identification of clusters...
Tian Zhang, Raghu Ramakrishnan, Miron Livny
VLDB
1997
ACM
104views Database» more  VLDB 1997»
14 years 2 months ago
Integrating Reliable Memory in Databases
Abstract. Recent results in the Rio project at the University of Michigan show that it is possible to create an area of main memory that is as safe as disk from operating system cr...
Wee Teck Ng, Peter M. Chen
AISB
1994
Springer
14 years 2 months ago
Formal Memetic Algorithms
Abstract. A formal, representation-independent form of a memetic algorithm-a genetic algorithm incorporating local search--is introduced. A generalisedform of N-point crossover is ...
Nicholas J. Radcliffe, Patrick D. Surry
« Prev « First page 2496 / 2580 Last » Next »