Sciweavers

2028 search results - page 387 / 406
» Deriving Relation Keys from XML Keys
Sort
View
124
Voted
ISCA
2006
IEEE
137views Hardware» more  ISCA 2006»
15 years 9 months ago
Multiple Instruction Stream Processor
Microprocessor design is undergoing a major paradigm shift towards multi-core designs, in anticipation that future performance gains will come from exploiting threadlevel parallel...
Richard A. Hankins, Gautham N. Chinya, Jamison D. ...
153
Voted
DOCENG
2006
ACM
15 years 9 months ago
Content based SMS spam filtering
In the recent years, we have witnessed a dramatic increment in the volume of spam email. Other related forms of spam are increasingly revealing as a problem of importance, special...
José María Gómez Hidalgo, Gui...
138
Voted
ML
2006
ACM
103views Machine Learning» more  ML 2006»
15 years 9 months ago
Type-safe distributed programming for OCaml
Existing ML-like languages guarantee type-safety, ensuring memty and protecting the invariants of abstract types, but only within single executions of single programs. Distributed...
John Billings, Peter Sewell, Mark R. Shinwell, Rok...
MMSEC
2006
ACM
160views Multimedia» more  MMSEC 2006»
15 years 9 months ago
Extraction in software watermarking
The widespread use of the Internet makes software piracy and unauthorized modification easier and more frequent. Among the many techniques developed for protecting software copyr...
William Zhu, Clark D. Thomborson
140
Voted
SAINT
2005
IEEE
15 years 9 months ago
Adaptive Semantic Support Provisioning in Mobile Internet Environments
The Mobile Internet scenario encourages the design and development of context-aware applications that provide results depending on context information, such as the relative positi...
Antonio Corradi, Rebecca Montanari, Alessandra Ton...