Sciweavers

5196 search results - page 981 / 1040
» State of Application Assessment
Sort
View
ICDM
2007
IEEE
197views Data Mining» more  ICDM 2007»
14 years 3 months ago
Trend Motif: A Graph Mining Approach for Analysis of Dynamic Complex Networks
Complex networks have been used successfully in scientific disciplines ranging from sociology to microbiology to describe systems of interacting units. Until recently, studies of...
Ruoming Jin, Scott McCallen, Eivind Almaas
ISCA
2007
IEEE
168views Hardware» more  ISCA 2007»
14 years 3 months ago
Limiting the power consumption of main memory
The peak power consumption of hardware components affects their power supply, packaging, and cooling requirements. When the peak power consumption is high, the hardware components...
Bruno Diniz, Dorgival Olavo Guedes Neto, Wagner Me...
MICRO
2007
IEEE
159views Hardware» more  MICRO 2007»
14 years 3 months ago
Software-Based Online Detection of Hardware Defects Mechanisms, Architectural Support, and Evaluation
As silicon process technology scales deeper into the nanometer regime, hardware defects are becoming more common. Such defects are bound to hinder the correct operation of future ...
Kypros Constantinides, Onur Mutlu, Todd M. Austin,...
P2P
2007
IEEE
101views Communications» more  P2P 2007»
14 years 3 months ago
Grid Resource Scheduling with Gossiping Protocols
Abstract— Grid resource providers can use gossiping to disseminate their available resource state to remote regions of the grid to attract application load. Pairwise gossiping pr...
Deger Cenk Erdil, Michael J. Lewis
ATAL
2007
Springer
14 years 3 months ago
IFSA: incremental feature-set augmentation for reinforcement learning tasks
Reinforcement learning is a popular and successful framework for many agent-related problems because only limited environmental feedback is necessary for learning. While many algo...
Mazda Ahmadi, Matthew E. Taylor, Peter Stone