Sciweavers

13987 search results - page 2589 / 2798
» The Two Guards Problem
Sort
View
DSN
2008
IEEE
14 years 2 months ago
Anomaly? application change? or workload change? towards automated detection of application performance anomaly and change
: Automated tools for understanding application behavior and its changes during the application life-cycle are essential for many performance analysis and debugging tasks. Applicat...
Ludmila Cherkasova, Kivanc M. Ozonat, Ningfang Mi,...
ECCB
2008
IEEE
14 years 2 months ago
Functional coherence in domain interaction networks
Motivation: Extracting functional information from protein–protein interactions (PPI) poses significant challenges arising from the noisy, incomplete, generic and static nature...
Jayesh Pandey, Mehmet Koyutürk, Shankar Subra...
FOCS
2008
IEEE
14 years 2 months ago
Kakeya Sets, New Mergers and Old Extractors
A merger is a probabilistic procedure which extracts the randomness out of any (arbitrarily correlated) set of random variables, as long as one of them is uniform. Our main result...
Zeev Dvir, Avi Wigderson
GLOBECOM
2008
IEEE
14 years 2 months ago
Adaptive Soft Frequency Reuse for Inter-Cell Interference Coordination in SC-FDMA Based 3GPP LTE Uplinks
This paper proposes a decentralized adaptive soft frequency reuse scheme for the uplink of a 4G long-term evolution (LTE) system. While universal frequencies reuse (UFR) is being ...
Xuehong Mao, Amine Maaref, Koon Hoo Teo
ICDM
2008
IEEE
235views Data Mining» more  ICDM 2008»
14 years 2 months ago
DECK: Detecting Events from Web Click-Through Data
In the past few years there has been increased research interest in detecting previously unidentified events from Web resources. Our focus in this paper is to detect events from ...
Ling Chen 0002, Yiqun Hu, Wolfgang Nejdl
« Prev « First page 2589 / 2798 Last » Next »