Sciweavers

5046 search results - page 938 / 1010
» Non-redundant data clustering
Sort
View
CCGRID
2005
IEEE
13 years 10 months ago
The Composite Endpoint Protocol (CEP): scalable endpoints for terabit flows
We introduce the Composite Endpoint Protocol (CEP) which efficiently composes a set of transmission elements to support high speed flows which exceed the capabilities of a single...
Eric Weigle, Andrew A. Chien
CF
2005
ACM
13 years 10 months ago
Exploiting processor groups to extend scalability of the GA shared memory programming model
Exploiting processor groups is becoming increasingly important for programming next-generation high-end systems composed of tens or hundreds of thousands of processors. This paper...
Jarek Nieplocha, Manojkumar Krishnan, Bruce Palmer...
COCOA
2008
Springer
13 years 10 months ago
New Algorithms for k-Center and Extensions
The problem of interest is covering a given point set with homothetic copies of several convex containers C1,...,Ck, while the objective is to minimize the maximum over the dilatat...
René Brandenberg, Lucia Roth
ERCIMDL
2008
Springer
181views Education» more  ERCIMDL 2008»
13 years 10 months ago
Author Name Disambiguation for Citations Using Topic and Web Correlation
Abstract. Today, bibliographic digital libraries play an important role in helping members of academic community search for novel research. In particular, author disambiguation for...
Kai-Hsiang Yang, Hsin-Tsung Peng, Jian-Yi Jiang, H...
IMC
2007
ACM
13 years 9 months ago
Using uncleanliness to predict future botnet addresses
The increased use of botnets as an attack tool and the awareness attackers have of blocking lists leads to the question of whether we can effectively predict future bot locations...
M. Patrick Collins, Timothy J. Shimeall, Sidney Fa...