Sciweavers

2169 search results - page 369 / 434
» Using Risk Analysis to Evaluate Design Alternatives
Sort
View
SIGCOMM
2012
ACM
11 years 11 months ago
Mirror mirror on the ceiling: flexible wireless links for data centers
Modern data centers are massive, and support a range of distributed applications across potentially hundreds of server racks. As their utilization and bandwidth needs continue to ...
Xia Zhou, Zengbin Zhang, Yibo Zhu, Yubo Li, Saipri...
FAST
2010
13 years 11 months ago
Discovery of Application Workloads from Network File Traces
An understanding of application I/O access patterns is useful in several situations. First, gaining insight into what applications are doing with their data at a semantic level he...
Neeraja J. Yadwadkar, Chiranjib Bhattacharyya, K. ...
OOPSLA
2004
Springer
14 years 2 months ago
Transparent proxies for java futures
A proxy object is a surrogate or placeholder that controls access to another target object. Proxies can be used to support distributed programming, lazy or parallel evaluation, ac...
Polyvios Pratikakis, Jaime Spacco, Michael W. Hick...
BMCBI
2008
112views more  BMCBI 2008»
13 years 9 months ago
Normalization for triple-target microarray experiments
Background: Most microarray studies are made using labelling with one or two dyes which allows the hybridization of one or two samples on the same slide. In such experiments, the ...
Marie-Laure Martin-Magniette, Julie Aubert, Avner ...
ISPD
2004
ACM
97views Hardware» more  ISPD 2004»
14 years 2 months ago
Implementation and extensibility of an analytic placer
Automated cell placement is a critical problem in VLSI physical design. New analytical placement methods that simultaneously spread cells and optimize wirelength have recently rec...
Andrew B. Kahng, Qinke Wang