Sciweavers

2302 search results - page 118 / 461
» Privacy-preserving Distributed Clustering using Generative M...
Sort
View
FPL
2006
Springer
125views Hardware» more  FPL 2006»
15 years 8 months ago
Application-Specific Memory Interleaving for FPGA-Based Grid Computations: A General Design Technique
Many compute-intensive applications generate single result values by accessing clusters of nearby points in grids of one, two, or more dimensions. Often, the performance of FGPA i...
Tom Van Court, Martin C. Herbordt
KDD
2009
ACM
194views Data Mining» more  KDD 2009»
16 years 5 months ago
Combining link and content for community detection: a discriminative approach
In this paper, we consider the problem of combining link and content analysis for community detection from networked data, such as paper citation networks and Word Wide Web. Most ...
Tianbao Yang, Rong Jin, Yun Chi, Shenghuo Zhu
HICSS
2003
IEEE
116views Biometrics» more  HICSS 2003»
15 years 10 months ago
XML Based Robust Client-Server Communication for a Distributed Telecommunication Management System
Our Distributed Telecommunication Management System (DTMS) uses an object-oriented model to describe the networked Voice Communication System (VCS) to be managed. In order to allo...
Karl M. Göschka, Helmut Reis, Robert Smeikal
CCGRID
2009
IEEE
15 years 11 months ago
Markov Model Based Disk Power Management for Data Intensive Workloads
—In order to meet the increasing demands of present and upcoming data-intensive computer applications, there has been a major shift in the disk subsystem, which now consists of m...
Rajat Garg, Seung Woo Son, Mahmut T. Kandemir, Pad...
ICCAD
1999
IEEE
81views Hardware» more  ICCAD 1999»
15 years 9 months ago
Modeling design constraints and biasing in simulation using BDDs
Constraining and input biasing are frequently used techniques in functional verification methodologies based on randomized simulation generation. Constraints confine the simulatio...
Jun Yuan, Kurt Shultz, Carl Pixley, Hillel Miller,...