Sciweavers

446 search results - page 24 / 90
» An approach to safe object sharing
Sort
View
PVLDB
2008
124views more  PVLDB 2008»
13 years 7 months ago
Scheduling shared scans of large data files
We study how best to schedule scans of large data files, in the presence of many simultaneous requests to a common set of files. The objective is to maximize the overall rate of p...
Parag Agrawal, Daniel Kifer, Christopher Olston
TLT
2010
124views more  TLT 2010»
13 years 6 months ago
Bootstrapping a Culture of Sharing to Facilitate Open Educational Resources
—It seems self-evident that life for teachers would be simplified if there existed a large corpus of relevant resources that was available for them to reuse and for inquisitive s...
Hugh C. Davis, Leslie Carr, Jessie M. N. Hey, Yvon...
ICDM
2009
IEEE
169views Data Mining» more  ICDM 2009»
13 years 5 months ago
Learning the Shared Subspace for Multi-task Clustering and Transductive Transfer Classification
There are many clustering tasks which are closely related in the real world, e.g. clustering the web pages of different universities. However, existing clustering approaches neglec...
Quanquan Gu, Jie Zhou
ECOOP
2001
Springer
14 years 3 days ago
Distinctness and Sharing Domains for Static Analysis of Java Programs
Abstract. The application field of static analysis techniques for objectoriented programming is getting broader, ranging from compiler optimizations to security issues. This leads...
Isabelle Pollet, Baudouin Le Charlier, Agostino Co...
DAC
2005
ACM
14 years 8 months ago
Flexible ASIC: shared masking for multiple media processors
ASIC provides more than an order of magnitude advantage in terms of density, speed, and power requirement per gate. However, economic (cost of masks) and technological (deep micro...
Jennifer L. Wong, Farinaz Koushanfar, Miodrag Potk...