Sciweavers

1015 search results - page 193 / 203
» The data locality of work stealing
Sort
View
CORR
2008
Springer
142views Education» more  CORR 2008»
13 years 8 months ago
On the Capacity and Diversity-Multiplexing Tradeoff of the Two-Way Relay Channel
This paper considers a multiple input multiple output (MIMO) two-way relay channel, where two nodes want to exchange data with each other using multiple relays. An iterative algor...
Rahul Vaze, Robert W. Heath Jr.
CN
2006
64views more  CN 2006»
13 years 8 months ago
Piggybacking related domain names to improve DNS performance
In this paper, we present a novel approach to exploit the relationships among domain names to improve the cache hit rate for a local DNS server. Using these relationships, an auth...
Hao Shang, Craig E. Wills
IJCV
2008
223views more  IJCV 2008»
13 years 8 months ago
Robust Object Detection with Interleaved Categorization and Segmentation
This paper presents a novel method for detecting and localizing objects of a visual category in cluttered real-world scenes. Our approach considers object categorization and figure...
Bastian Leibe, Ales Leonardis, Bernt Schiele
IJFCS
2008
102views more  IJFCS 2008»
13 years 8 months ago
Succinct Minimal Generators: Theoretical Foundations and Applications
In data mining applications, highly sized contexts are handled what usually results in a considerably large set of frequent itemsets, even for high values of the minimum support t...
Tarek Hamrouni, Sadok Ben Yahia, Engelbert Mephu N...
JAIR
2008
103views more  JAIR 2008»
13 years 8 months ago
SATzilla: Portfolio-based Algorithm Selection for SAT
It has been widely observed that there is no single "dominant" SAT solver; instead, different solvers perform best on different instances. Rather than following the trad...
Lin Xu, Frank Hutter, Holger H. Hoos, Kevin Leyton...