Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,024,249 papers from all fields of science
Search
Sign In
Create Free Account
Bottleneck (engineering)
In engineering, a bottleneck is a phenomenon by which the performance or capacity of an entire system is severely limited by a single component. The…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
16 relations
Algorithmic efficiency
Computer programming
Critical path method
Fairness measure
Expand
Broader (1)
Network performance
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2016
Highly Cited
2016
Automatic Differentiation Variational Inference
A. Kucukelbir
,
Dustin Tran
,
R. Ranganath
,
A. Gelman
,
D. Blei
Journal of machine learning research
2016
Corpus ID: 9593520
Probabilistic modeling is iterative. A scientist posits a simple model, fits it to her data, refines it according to her analysis…
Expand
Highly Cited
2008
Highly Cited
2008
Identity-based encryption with efficient revocation
A. Boldyreva
,
Vipul Goyal
,
Virendra Kumar
IACR Cryptology ePrint Archive
2008
Corpus ID: 1473455
Identity-based encryption (IBE) is an exciting alternative to public-key encryption, as IBE eliminates the need for a Public Key…
Expand
Review
2008
Review
2008
Variational quantum approaches for computing vibrational energies of polyatomic molecules
J. Bowman
,
T. Carrington
,
H. Meyer
2008
Corpus ID: 3554086
In this article, we review state-of-the-art methods for computing vibrational energies of polyatomic molecules using quantum…
Expand
Highly Cited
2007
Highly Cited
2007
A Decision Procedure for Bit-Vectors and Arrays
Vijay Ganesh
,
D. Dill
International Conference on Computer Aided…
2007
Corpus ID: 9149475
STP is a decision procedure for the satisfiability of quantifier-free formulas in the theory of bit-vectors and arrays that has…
Expand
Highly Cited
2006
Highly Cited
2006
Optimizing network virtualization in Xen
Aravind Menon
,
A. Cox
,
W. Zwaenepoel
2006
Corpus ID: 1010676
In this paper, we propose and evaluate three techniques for optimizing network performance in the Xen virtualized environment…
Expand
Review
2005
Review
2005
A system failure framework for innovation policy design
Rosalinde Klein Woolthuis
,
M. Lankhuizen
,
V. Gilsing
2005
Corpus ID: 2822346
Highly Cited
1995
Highly Cited
1995
Bayesian Inference and the Analytic Continuation of Imaginary-Time Quantum Monte Carlo Data
J. Gubernatis
,
J. Bonca
,
M. Jarrell
1995
Corpus ID: 56126301
We present brief description of how methods of Bayesian inference are used to obtain real frequency information by the analytic…
Expand
Highly Cited
1989
Highly Cited
1989
Constrained reaction coordinate dynamics for the simulation of rare events
E. Carter
,
G. Ciccotti
,
G. Ciccotti
,
J. Hynes
,
R. Kapral
1989
Corpus ID: 18394919
Highly Cited
1986
Highly Cited
1986
Programming pearls: the envelope is back
J. Bentley
CACM
1986
Corpus ID: 18233745
Highly Cited
1986
Highly Cited
1986
Application of the Similarity Coefficient Method in Group Technology
H. Seifoddini
,
P. Wolfe
1986
Corpus ID: 59190132
Abstract The Similarity Coefficient Method (SCM) is one of the methods used to form the machine cells in group technology…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE