Sciweavers

16832 search results - page 3245 / 3367
» Scenario Based Evaluation
Sort
View
IH
1999
Springer
14 years 2 months ago
Hiding Signatures in Graph Coloring Solutions
Abstract. One way to protect a digital product is to embed an author's signature into the object in the form of minute errors. However, this technique cannot be directly appli...
Gang Qu, Miodrag Potkonjak
HPCA
1998
IEEE
14 years 2 months ago
Address Translation Mechanisms In Network Interfaces
Good network hardware performance is often squandered by overheads for accessing the network interface (NI) within a host. NIs that support user-level messaging avoid frequent ope...
Ioannis Schoinas, Mark D. Hill
PKDD
1999
Springer
106views Data Mining» more  PKDD 1999»
14 years 2 months ago
Heuristic Measures of Interestingness
When mining a large database, the number of patterns discovered can easily exceed the capabilities of a human user to identify interesting results. To address this problem, variou...
Robert J. Hilderman, Howard J. Hamilton
IEEEPACT
1998
IEEE
14 years 2 months ago
Adaptive Scheduling of Computations and Communications on Distributed Memory Systems
Compile-time scheduling is one approach to extract parallelism which has proved effective when the execution behavior is predictable. Unfortunately, the performance of most priori...
Mayez A. Al-Mouhamed, Homam Najjari
INFOCOM
1998
IEEE
14 years 2 months ago
Packet Fair Queueing Algorithms for Wireless Networks with Location-Dependent Errors
While Packet Fair Queueing (PFQ) algorithms provide both bounded delay and fairness in wired networks, they cannot be applied directly to wireless networks. The key difficulty is t...
T. S. Eugene Ng, Ion Stoica, Hui Zhang
« Prev « First page 3245 / 3367 Last » Next »