Sciweavers

4624 search results - page 150 / 925
» Performance Evaluation of HPCN Applications
Sort
View
CONCURRENCY
2008
82views more  CONCURRENCY 2008»
13 years 9 months ago
Segregation and scheduling for P2P applications with the interceptor middleware system
Very large size Peer-to-Peer systems are often required to implement efficient and scalable services, but usually they can be built only by assembling resources contributed by man...
Cosimo Anglano
ICTAI
2009
IEEE
14 years 5 months ago
Large-Scale Dependency Knowledge Acquisition and its Extrinsic Evaluation Through Word Sense Disambiguation
Knowledge plays a central role in intelligent systems. Manual knowledge acquisition is very inefficient and expensive. In this paper, we present (1) an automatic method to acquire...
Ping Chen, Wei Ding 0003, Chris Bowes, David Brown
ACIVS
2008
Springer
14 years 4 months ago
Towards Fully Automatic Image Segmentation Evaluation
Spatial region (image) segmentation is a fundamental step for many computer vision applications. Although many methods have been proposed, less work has been done in developing sui...
Lutz Goldmann, Tomasz Adamek, Peter Vajda, Mustafa...
CHES
2010
Springer
141views Cryptology» more  CHES 2010»
13 years 11 months ago
Fair and Comprehensive Methodology for Comparing Hardware Performance of Fourteen Round Two SHA-3 Candidates Using FPGAs
Performance in hardware has been demonstrated to be an important factor in the evaluation of candidates for cryptographic standards. Up to now, no consensus exists on how such an e...
Kris Gaj, Ekawat Homsirikamol, Marcin Rogawski
SIGSOFT
2008
ACM
14 years 11 months ago
A scalable technique for characterizing the usage of temporaries in framework-intensive Java applications
Framework-intensive applications (e.g., Web applications) heavily use temporary data structures, often resulting in performance bottlenecks. This paper presents an optimized blend...
Bruno Dufour, Barbara G. Ryder, Gary Sevitsky