Sciweavers

1266 search results - page 253 / 254
» Threat Evaluation Method for Distributed Network Environment
Sort
View
CGO
2010
IEEE
14 years 2 months ago
Automatic creation of tile size selection models
Tiling is a widely used loop transformation for exposing/exploiting parallelism and data locality. Effective use of tiling requires selection and tuning of the tile sizes. This is...
Tomofumi Yuki, Lakshminarayanan Renganarayanan, Sa...
SIGUCCS
2006
ACM
14 years 1 months ago
Because we have better things to do: automating common support tasks
As technology permeates more aspects of our everyday lives, greater demands are placed on information technology personnel. Lehigh University computing consultants have found thei...
Keith B. Erekson, Stephen G. Lewis
SIGMETRICS
2010
ACM
208views Hardware» more  SIGMETRICS 2010»
14 years 3 days ago
Dynamics in congestion games
Game theoretic modeling and equilibrium analysis of congestion games have provided insights in the performance of Internet congestion control, road transportation networks, etc. D...
Devavrat Shah, Jinwoo Shin
MASCOTS
2003
13 years 8 months ago
Bottleneck Estimation for Load Control Gateways
Providing Quality of Service (QoS) to inelastic data transmissions in a cost-efficient, highly scalable, and realistic fashion in IP networks remains a challenging research issue....
Krishna Pandit, Jens Schmitt, Martin Karsten, Ralf...
PVLDB
2008
116views more  PVLDB 2008»
13 years 6 months ago
Tighter estimation using bottom k sketches
Summaries of massive data sets support approximate query processing over the original data. A basic aggregate over a set of records is the weight of subpopulations specified as a ...
Edith Cohen, Haim Kaplan