Sciweavers

419 search results - page 64 / 84
» Three Case Studies of Large-Scale Data Flows
Sort
View
ICDE
2010
IEEE
238views Database» more  ICDE 2010»
14 years 3 months ago
Correlation hiding by independence masking
— Extracting useful correlation from a dataset has been extensively studied. In this paper, we deal with the opposite, namely, a problem we call correlation hiding (CH), which is...
Yufei Tao, Jian Pei, Jiexing Li, Xiaokui Xiao, Ke ...
ICSE
2009
IEEE-ACM
14 years 3 months ago
Lightweight fault-localization using multiple coverage types
Lightweight fault-localization techniques use program coverage to isolate the parts of the code that are most suspicious of being faulty. In this paper, we present the results of ...
Raúl A. Santelices, James A. Jones, Yanbing...
GLOBECOM
2008
IEEE
14 years 3 months ago
Target-Based Power Control for Queueing Systems with Applications to Packet Switches
—Many data center devices, for instance packet switches, can be modeled within the context of resource constrained queueing systems. In this paper, we define a novel algorithm c...
Benjamin Yolken, Dimitrios Tsamis, Nicholas Bambos
INFOCOM
2011
IEEE
13 years 12 days ago
Dissemination in opportunistic mobile ad-hoc networks: The power of the crowd
—Opportunistic ad-hoc communication enables portable devices such as smartphones to effectively exchange information, taking advantage of their mobility and locality. The nature ...
Gjergji Zyba, Geoffrey M. Voelker, Stratis Ioannid...
APSEC
2004
IEEE
14 years 22 days ago
Quality Improvements by Integrating Development Processes
Software is an increasing and important part of many products and systems. Software, hardware, and system level components have been developed and produced following separate proc...
Annita Persson Dahlqvist, Ivica Crnkovic, Ulf Askl...