Sciweavers

2139 search results - page 419 / 428
» Distributed computing and computer security education
Sort
View
IEEEPACT
2009
IEEE
14 years 2 months ago
Polyhedral-Model Guided Loop-Nest Auto-Vectorization
Abstract—Optimizing compilers apply numerous interdependent optimizations, leading to the notoriously difficult phase-ordering problem — that of deciding which transformations...
Konrad Trifunovic, Dorit Nuzman, Albert Cohen, Aya...
JCDL
2006
ACM
147views Education» more  JCDL 2006»
14 years 1 months ago
The social life of books in the humane library
The development of public libraries may have inadvertently brought the age of marginalia to a close but the advent of digital libraries could revive the practice of marginal annot...
Yoram Chisik, Nancy Kaplan
JCDL
2006
ACM
151views Education» more  JCDL 2006»
14 years 1 months ago
Tagging of name records for genealogical data browsing
In this paper we present a method of parsing unstructured textual records briefly describing a person and their direct relatives, which we use in the construction of a browsing t...
Mike Perrow, David Barber
ASSETS
2008
ACM
13 years 9 months ago
Software and technologies designed for people with autism: what do users want?
Software developers, designers and researchers have been looking to technology for solutions to help and educate people with autism for over two decades. There are many examples o...
Cynthia Putnam, Lorna Chong
ICDE
2009
IEEE
177views Database» more  ICDE 2009»
14 years 9 months ago
Light-Weight, Runtime Verification of Query Sources
Modern database systems increasingly make use of networked storage. This storage can be in the form of SAN's or in the form of shared-nothing nodes in a cluster. One type of a...
Tingjian Ge, Stanley B. Zdonik