• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 645
Next 10 →

Bayesian inference on phylogeny and its impact on evolutionary biology.

by John P Huelsenbeck , Fredrik Ronquist , Rasmus Nielsen , Jonathan P Bollback - Science , 2001
"... 1 As a discipline, phylogenetics is becoming transformed by a flood of molecular data. These data allow broad questions to be asked about the history of life, but also present difficult statistical and computational problems. Bayesian inference of phylogeny brings a new perspective to a number of o ..."
Abstract - Cited by 235 (10 self) - Add to MetaCart
in statistics (1-3). Although Bayesian inference of phylogeny uses the same models of evolution as many other methods of analysis, it represents a powerful tool for addressing a number of long-standing, complex questions in evolutionary biology Bayesian Inference of Phylogeny Bayesian inference of phylogeny

Meridian: A Lightweight Network Location Service without Virtual Coordinates

by Bernard Wong, Aleksandrs Slivkins, Emin Gün Sirer - In SIGCOMM , 2005
"... This paper introduces a lightweight, scalable and accurate framework, called Meridian, for performing node selection based on network location. The framework consists of an overlay network structured around multi-resolution rings, query routing with direct measurements, and gossip protocols for diss ..."
Abstract - Cited by 190 (8 self) - Add to MetaCart
This paper introduces a lightweight, scalable and accurate framework, called Meridian, for performing node selection based on network location. The framework consists of an overlay network structured around multi-resolution rings, query routing with direct measurements, and gossip protocols

In Search of an API for Scalable Reliable Multicast

by Jim Gemmell, Jörg Liebeherr, Dave Bassett , 1997
"... this paper we explore the issues involved with a reliable multicast protocol for the Internet that can scale to millions of receivers. Ideally, we would like a protocol and API for reliable, scalable multicast that would be universally useful to all such multicast applications. Some would argue that ..."
Abstract - Cited by 7 (2 self) - Add to MetaCart
this paper we explore the issues involved with a reliable multicast protocol for the Internet that can scale to millions of receivers. Ideally, we would like a protocol and API for reliable, scalable multicast that would be universally useful to all such multicast applications. Some would argue

Data-Centric Storage in Sensornets with GHT, a Geographic Hash Table

by Sylvia Ratnasamy, Brad Karp, Scott Shenker, Deborah Estrin, Li Yin - Mobile Networks and Applications , 2003
"... Making effective use of the vast amounts of data gathered by large-scale sensor networks (sensornets) will require scalable, self-organizing, and energy-efficient data dissemination algorithms. For sensornets, where the content of the data is more important than the identity of the node that gathers ..."
Abstract - Cited by 167 (2 self) - Add to MetaCart
network addresses [1,11]. Previous work on data-centric routing has shown it to be an energy-efficient data dissemination method for sensornets [12]. Herein, we argue that a companion method, data-centric storage (DCS), is also a useful approach. Under DCS, sensed data are stored at a node determined

Dynamine: Finding Common Error Patterns by Mining Software Revision Histories

by Benjamin Livshits - In ESEC/FSE , 2005
"... A great deal of attention has lately been given to addressing software bugs such as errors in operating system drivers or security bugs. However, there are many other lesser known errors specificto individual applications or APIs and these violations of applicationspecific coding rules are responsib ..."
Abstract - Cited by 165 (12 self) - Add to MetaCart
A great deal of attention has lately been given to addressing software bugs such as errors in operating system drivers or security bugs. However, there are many other lesser known errors specificto individual applications or APIs and these violations of applicationspecific coding rules

New directions in traffic measurement and accounting: Focusing on the elephants, ignoring the mice

by Cristian Estan, George Varghese - ACM Transactions on Computer Systems , 2003
"... Accurate network traffic measurement is required for accounting, bandwidth provisioning and detecting DoS attacks. These applications see the traffic as a collection of flows they need to measure. As link speeds and the number of flows increase, keeping a counter for each flow is too expensive (usin ..."
Abstract - Cited by 158 (9 self) - Add to MetaCart
(using SRAM) or slow (using DRAM). The current state-of-the-art methods (Cisco’s sampled NetFlow) which count periodically sampled packets are slow, inaccurate and resourceintensive. Previous work showed that at different granularities a small number of “heavy hitters” accounts for a large share

Scalable semantic analytics on social networks for addressing the problem of conflict of interest detection

by Boanerges Aleman-meza, Li Ding, I. Budak Arpinar, Tim Finin - ACM Trans. Web , 2008
"... In this paper, we demonstrate the applicability of semantic techniques for detection of Conflict of Interest (COI). We explain the common challenges involved in building scalable Semantic Web applications, in particular those addressing connecting-the-dots problems. We describe in detail the challen ..."
Abstract - Cited by 7 (0 self) - Add to MetaCart
In this paper, we demonstrate the applicability of semantic techniques for detection of Conflict of Interest (COI). We explain the common challenges involved in building scalable Semantic Web applications, in particular those addressing connecting-the-dots problems. We describe in detail

Anonymous Gossip: Improving Multicast Reliability in Mobile Ad-Hoc Networks

by Ranveer Chandra, Venugopalan Ramasubramanian, Kenneth P. Birman - In Proc. 21st International Conference on Distributed Computing Systems (ICDCS , 2001
"... In recent years, a number of applications of ad-hoc networks have been proposed. Many of them are based on the availability of a robust and reliable multicast protocol. In this paper, we address the issue of reliability and propose a scalable method to improve packet delivery of multicast routing pr ..."
Abstract - Cited by 141 (0 self) - Add to MetaCart
In recent years, a number of applications of ad-hoc networks have been proposed. Many of them are based on the availability of a robust and reliable multicast protocol. In this paper, we address the issue of reliability and propose a scalable method to improve packet delivery of multicast routing

Scalable Hardware Memory Disambiguation for High ILP Processors

by Simha Sethumadhavan, Rajagopalan Desikan, Ý Doug Burger, Charles R. Moore, Stephen W. Keckler - In Proc. of the 36th Intl. Symp. on Microarchitecture , 2003
"... This paper describes several methods for improving the scalability of memory disambiguation hardware for future high ILP processors. As the number of in-flight instructions grows with issue width and pipeline depth, the load/store queues (LSQ) threaten to become a bottleneck in both power and latenc ..."
Abstract - Cited by 70 (4 self) - Add to MetaCart
This paper describes several methods for improving the scalability of memory disambiguation hardware for future high ILP processors. As the number of in-flight instructions grows with issue width and pipeline depth, the load/store queues (LSQ) threaten to become a bottleneck in both power

SMArTIC: Toward building an accurate, robust and scalable specification miner

by David Lo, Siau-cheng Khoo - In SIGSOFT FSE , 2006
"... Improper management of software evolution, compounded by imprecise, and changing requirements, along with the “short time to market ” requirement, commonly leads to a lack of up-to-date specifications. This can result in software that is characterized by bugs, anomalies and even security threats. So ..."
Abstract - Cited by 69 (26 self) - Add to MetaCart
. Software specification mining is a new technique to address this concern by inferring specifications automatically. In this paper, we propose a novel API specification mining architecture called SMArTIC (Specification Mining Architecture with Trace fIltering and Clustering) to improve the accuracy
Next 10 →
Results 1 - 10 of 645
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University