Sciweavers

11814 search results - page 2182 / 2363
» On Generalization by Neural Networks
Sort
View
CCS
2009
ACM
15 years 11 months ago
Secure open source collaboration: an empirical study of linus' law
Open source software is often considered to be secure. One factor in this confidence in the security of open source software lies in leveraging large developer communities to find...
Andrew Meneely, Laurie A. Williams
HPDC
2009
IEEE
15 years 11 months ago
TakTuk, adaptive deployment of remote executions
This article deals with TakTuk, a middleware that deploys efficiently parallel remote executions on large scale grids (thousands of nodes). This tool is mostly intended for intera...
Benoit Claudel, Guillaume Huard, Olivier Richard
ISCC
2009
IEEE
250views Communications» more  ISCC 2009»
15 years 11 months ago
Access point-coordinated contention resolution for channel access in wireless LANs
MAHBOOB, AHMED M. Access Point-Coordinated Contention Resolution for Channel Access in Wireless LANs. (Under the direction of Assistant Professor Khaled A. Harfoush.) The most wid...
Ahmed M. Mahboob, Manjunath M. Prabhu, Khaled A. H...
143
Voted
INFOCOM
2009
IEEE
15 years 11 months ago
Rateless Coding with Feedback
The erasure resilience of rateless codes, such as Luby-Transform (LT) codes, makes them particularly suitable to a wide variety of loss-prone wireless and sensor network applicati...
Andrew Hagedorn, Sachin Agarwal, David Starobinski...
159
Voted
MICRO
2009
IEEE
124views Hardware» more  MICRO 2009»
15 years 11 months ago
ZerehCache: armoring cache architectures in high defect density technologies
Aggressive technology scaling to 45nm and below introduces serious reliability challenges to the design of microprocessors. Large SRAM structures used for caches are particularly ...
Amin Ansari, Shantanu Gupta, Shuguang Feng, Scott ...
« Prev « First page 2182 / 2363 Last » Next »