Sciweavers

7200 search results - page 1212 / 1440
» On the Computational Power of Winner-Take-All
Sort
View
CONCURRENCY
2010
110views more  CONCURRENCY 2010»
13 years 10 months ago
Redesigning the message logging model for high performance
Over the past decade the number of processors in the high performance facilities went up to hundreds of thousands. As a direct consequence, while the computational power follow th...
Aurelien Bouteiller, George Bosilca, Jack Dongarra
CGF
2008
125views more  CGF 2008»
13 years 10 months ago
Interactive Visualization for Memory Reference Traces
We present the Memory Trace Visualizer (MTV), a tool that provides interactive visualization and analysis of the sequence of memory operations performed by a program as it runs. A...
A. N. M. Imroz Choudhury, Kristin C. Potter, Steve...
CGF
2008
168views more  CGF 2008»
13 years 10 months ago
Interactive Global Illumination for Deformable Geometry in CUDA
Interactive global illumination for fully deformable scenes with dynamic relighting is currently a very elusive goal in the area of realistic rendering. In this work we propose a ...
Arne Schmitz, Markus Tavenrath, Leif Kobbelt
CORR
2010
Springer
175views Education» more  CORR 2010»
13 years 10 months ago
Incorporating Side Information in Probabilistic Matrix Factorization with Gaussian Processes
Probabilistic matrix factorization (PMF) is a powerful method for modeling data associated with pairwise relationships, finding use in collaborative filtering, computational biolo...
Ryan Prescott Adams, George E. Dahl, Iain Murray
COMCOM
2008
91views more  COMCOM 2008»
13 years 10 months ago
A WEP post-processing algorithm for a Robust 802.11 WLAN implementation
Wired Equivalent Privacy (WEP) protocol used within the IEEE 802.11 standard has "major security flaws" thus wireless local area networks (WLANs) using the protocol are ...
Taskin Koçak, Mohit Jagetia
« Prev « First page 1212 / 1440 Last » Next »