Sciweavers

3305 search results - page 559 / 661
» Can we Rely on SQL
Sort
View
PPOPP
2009
ACM
14 years 9 months ago
Transactional memory with strong atomicity using off-the-shelf memory protection hardware
This paper introduces a new way to provide strong atomicity in an implementation of transactional memory. Strong atomicity lets us offer clear semantics to programs, even if they ...
Martín Abadi, Tim Harris, Mojtaba Mehrara
CHI
2003
ACM
14 years 9 months ago
Where on-line meets on the streets: experiences with mobile mixed reality games
We describe two games in which online participants collaborated with mobile participants on the city streets. In the first, the players were online and professional performers wer...
Martin Flintham, Steve Benford, Rob Anastasi, Terr...
VLDB
2008
ACM
148views Database» more  VLDB 2008»
14 years 9 months ago
Purpose based access control for privacy protection in relational database systems
Abstract In this article, we present a comprehensive approach for privacy preserving access control based on the notion of purpose. In our model, purpose information associated wit...
Ji-Won Byun, Ninghui Li
ECIR
2009
Springer
14 years 6 months ago
Investigating Learning Approaches for Blog Post Opinion Retrieval
Blog post opinion retrieval is the problem of identifying posts which express an opinion about a particular topic. Usually the problem is solved using a 3 step process in which rel...
Shima Gerani, Mark James Carman, Fabio Crestani
CVPR
2010
IEEE
14 years 5 months ago
Unsupervised Learning of Invariant Features Using Video
We present an algorithm that learns invariant features from real data in an entirely unsupervised fashion. The principal benefit of our method is that it can be applied without hu...
David Stavens, Sebastian Thrun