Sciweavers

141 search results - page 22 / 29
» Detecting Attribute Dependencies from Query Feedback
Sort
View
ISCA
2007
IEEE
143views Hardware» more  ISCA 2007»
14 years 1 months ago
Performance pathologies in hardware transactional memory
Hardware Transactional Memory (HTM) systems reflect choices from three key design dimensions: conflict detection, version management, and conflict resolution. Previously propos...
Jayaram Bobba, Kevin E. Moore, Haris Volos, Luke Y...
IADT
1998
148views more  IADT 1998»
13 years 9 months ago
A Tool for Content-Based Image Retrieval in Object-Oriented Databases
Conventional image processing algorithms used to compare images are very timeconsuming, making them inappropriate for use in searching for an image in a huge collection of images ...
Caetano Traina Jr., Agma J. M. Traina, Rildo R. do...
SAC
2010
ACM
13 years 7 months ago
Graph-based verification of static program constraints
Software artifacts usually have static program constraints and these constraints should be satisfied in each reuse. In addition to this, the developers are also required to satisf...
Selim Ciraci, Pim van den Broek, Mehmet Aksit
CSMR
2000
IEEE
14 years 1 days ago
Analyzing Java Software by Combining Metrics and Program Visualization
Shimba, a prototype reverse engineering environment, has been built to support the understanding of Java software. Shimba uses Rigi and SCED to analyze, visualize, and explore the...
Tarja Systä, Ping Yu, Hausi A. Müller
ATAL
2007
Springer
13 years 11 months ago
A reinforcement learning based distributed search algorithm for hierarchical peer-to-peer information retrieval systems
The dominant existing routing strategies employed in peerto-peer(P2P) based information retrieval(IR) systems are similarity-based approaches. In these approaches, agents depend o...
Haizheng Zhang, Victor R. Lesser