Sciweavers

2795 search results - page 412 / 559
» Recommendations on recommendations
Sort
View
ICCCN
1997
IEEE
14 years 13 days ago
Effective Search Strategies for Application-Independent Speedup in UDP Demultiplexing
We present UDP datagram demultiplexing techniques that can yield potentially substantial applicationindependent performance gains over BSD-derived UDP implementations. Our demulti...
Joseph T. Dixon, Kenneth L. Calvert
LCPC
1994
Springer
14 years 9 days ago
Optimizing Array Distributions in Data-Parallel Programs
Data parallel programs are sensitive to the distribution of data across processor nodes. We formulate the reduction of inter-node communication as an optimization on a colored gra...
Krishna Kunchithapadam, Barton P. Miller
ACMSE
2007
ACM
14 years 7 days ago
A case study in test management
Testing is an essential but often under-utilized area of software engineering. A variety of software testing techniques have been developed to effectively identify bugs in source ...
Tauhida Parveen, Scott R. Tilley, George Gonzalez
BIBE
2007
IEEE
159views Bioinformatics» more  BIBE 2007»
14 years 7 days ago
Non-negative Tensor Factorization Based on Alternating Large-scale Non-negativity-constrained Least Squares
Non-negative matrix factorization (NMF) and non-negative tensor factorization (NTF) have attracted much attention and have been successfully applied to numerous data analysis probl...
Hyunsoo Kim, Haesun Park, Lars Eldén
CHI
2007
ACM
14 years 6 days ago
Command line or pretty lines?: comparing textual and visual interfaces for intrusion detection
Intrusion detection (ID) is one of network security engineers' most important tasks. Textual (command-line) and visual interfaces are two common modalities used to support en...
Ramona Su Thompson, Esa M. Rantanen, William Yurci...