Sciweavers

4085 search results - page 666 / 817
» Data Services - From Data to Containers
Sort
View
IFIPPACT
1994
15 years 5 months ago
Exploiting the Parallelism Exposed by Partial Evaluation
: We describe an approach to parallel compilation that seeks to harness the vast amount of ne-grain parallelism that is exposed through partial evaluation of numerically-intensive ...
Rajeev J. Surati, Andrew A. Berlin
129
Voted
OSDI
1994
ACM
15 years 5 months ago
A Caching Model of Operating System Kernel Functionality
Operating system research has endeavored to develop micro-kernels that provide modularity, reliability and security improvements over conventional monolithic kernels. However, the...
David R. Cheriton, Kenneth J. Duda
SODA
1993
ACM
118views Algorithms» more  SODA 1993»
15 years 5 months ago
Scapegoat Trees
We present an algorithm for maintaining binary search trees. The amortized complexity per INSERT or DELETE is O(log n) while the worst-case cost of a SEARCH is O(log n). Scapegoat...
Igal Galperin, Ronald L. Rivest
133
Voted
MVA
1990
114views Computer Vision» more  MVA 1990»
15 years 4 months ago
Radar Image Processing for Locating Underground Linear Objects
This paper presents an image processing method for locating underground linear objects using ground-probing radar data. One of the problems when using groundprobing radars is how ...
Toru Kaneko
131
Voted
CEC
2010
IEEE
15 years 4 months ago
Born to trade: A genetically evolved keyword bidder for sponsored search
In sponsored search auctions, advertisers choose a set of keywords based on products they wish to market. They bid for advertising slots that will be displayed on the search result...
Michael Munsey, Jonathan Veilleux, Sindhura Bikkan...