Sciweavers

153 search results - page 27 / 31
» Performance analysis of different checkpointing and recovery...
Sort
View
P2P
2008
IEEE
14 years 2 months ago
Faster Content Access in KAD
Many different Distributed Hash Tables (DHTs) have been designed, but only few have been successfully deployed. The implementation of a DHT needs to deal with practical aspects (e...
Moritz Steiner, Damiano Carra, Ernst W. Biersack
VTC
2008
IEEE
134views Communications» more  VTC 2008»
14 years 2 months ago
Comparison of Various Frequency Reuse Patterns for WiMAX Networks with Adaptive Beamforming
—In this paper, we evaluate the performance of a WiMAX network in different frequency reuse scenarios with and without adaptive beaforming technique. We study the possibility of ...
Masood Maqbool, Marceau Coupechoux, Philippe Godle...
EDBT
2004
ACM
131views Database» more  EDBT 2004»
14 years 7 months ago
Declustering Two-Dimensional Datasets over MEMS-Based Storage
Due to the large difference between seek time and transfer time in current disk technology, it is advantageous to perform large I/O using a single sequential access rather than mu...
Hailing Yu, Divyakant Agrawal, Amr El Abbadi
BMCBI
2008
132views more  BMCBI 2008»
13 years 7 months ago
Clustering ionic flow blockade toggles with a Mixture of HMMs
Background: Ionic current blockade signal processing, for use in nanopore detection, offers a promising new way to analyze single molecule properties with potential implications f...
Alexander G. Churbanov, Stephen Winters-Hilt
CLEF
2007
Springer
14 years 1 months ago
Stemming Approaches for East European Languages
In our participation in this CLEF evaluation campaign, the first objective is to propose and evaluate various indexing and search strategies for the Czech language in order to hop...
Ljiljana Dolamic, Jacques Savoy