Sciweavers

288 search results - page 53 / 58
» The WarpIV Simulation Kernel
Sort
View
SIGMETRICS
2009
ACM
103views Hardware» more  SIGMETRICS 2009»
14 years 2 months ago
Restrained utilization of idleness for transparent scheduling of background tasks
A common practice in system design is to treat features intended to enhance performance and reliability as low priority tasks by scheduling them during idle periods, with the goal...
Ningfang Mi, Alma Riska, Xin Li, Evgenia Smirni, E...
ICDM
2008
IEEE
176views Data Mining» more  ICDM 2008»
14 years 2 months ago
Inlier-Based Outlier Detection via Direct Density Ratio Estimation
We propose a new statistical approach to the problem of inlier-based outlier detection, i.e., finding outliers in the test set based on the training set consisting only of inlier...
Shohei Hido, Yuta Tsuboi, Hisashi Kashima, Masashi...
GLOBECOM
2007
IEEE
14 years 2 months ago
Redundant Array of Independent Fabrics - An Architecture for Next Generation Network
As the next generation network begins to incorporate the Internet, telecommunication and TV services, it becomes one of the most critical infrastructures for our society. Routers c...
Rongsen He, José G. Delgado-Frias
IPPS
2007
IEEE
14 years 1 months ago
Optimizing Inter-Nest Data Locality Using Loop Splitting and Reordering
With the increasing gap between processor speed and memory latency, the performance of data-dominated programs are becoming more reliant on fast data access, which can be improved...
Sofiane Naci
SECON
2007
IEEE
14 years 1 months ago
Distinguishing Data Transience from False Injection in Sensor Networks
— Wireless sensor networks are increasingly being employed for potentially hazardous and critical applications such as monitoring the gas concentration levels in a battle field....
Vinod Shukla, Daji Qiao