Sciweavers

2372 search results - page 396 / 475
» Probabilistic calling context
Sort
View
CJ
2010
193views more  CJ 2010»
13 years 5 months ago
Energy-Efficient Cloud Computing
Energy efficiency is increasingly important for future information and communication technologies (ICT), because the increased usage of ICT, together with increasing energy costs a...
Andreas Berl, Erol Gelenbe, Marco Di Girolamo, Gio...
CORR
2010
Springer
173views Education» more  CORR 2010»
13 years 5 months ago
Mining Multi-Level Frequent Itemsets under Constraints
Mining association rules is a task of data mining, which extracts knowledge in the form of significant implication relation of useful items (objects) from a database. Mining multi...
Mohamed Salah Gouider, Amine Farhat
ISCI
2011
13 years 2 months ago
Augmented k-ary n-cubes
We define an interconnection network AQn,k which we call the augmented kary n-cube by extending a k-ary n-cube in a manner analogous to the existing extension of an n-dimensional...
Yonghong Xiang, Iain A. Stewart
ISCI
2011
13 years 2 months ago
A tool for design pattern detection and software architecture reconstruction
It is well known that software maintenance and evolution are expensive activities, both in terms of invested time and money. Reverse engineering activities support the obtainment ...
Francesca Arcelli Fontana, Marco Zanoni
CSCL
2010
13 years 2 months ago
Using activity theory to understand intergenerational play: The case of Family Quest
We implemented a five-week family program called Family Quest where parents and children ages 9 to 13 played Quest Atlantis, a multiuser 3D educational computer game, at a local af...
Sinem Siyahhan, Sasha A. Barab, Michael P. Downton