Sciweavers

12084 search results - page 2280 / 2417
» Effect Systems with Subtyping
Sort
View
PPOPP
2010
ACM
16 years 26 days ago
The LOFAR correlator: implementation and performance analysis
LOFAR is the first of a new generation of radio telescopes. Rather than using expensive dishes, it forms a distributed sensor network that combines the signals from many thousands...
John W. Romein, P. Chris Broekema, Jan David Mol, ...
PPOPP
2010
ACM
16 years 26 days ago
Using data structure knowledge for efficient lock generation and strong atomicity
To achieve high-performance on multicore systems, sharedmemory parallel languages must efficiently implement atomic operations. The commonly used and studied paradigms for atomici...
Gautam Upadhyaya, Samuel P. Midkiff, Vijay S. Pai
151
Voted
SDM
2009
SIAM
235views Data Mining» more  SDM 2009»
16 years 24 days ago
Topic Cube: Topic Modeling for OLAP on Multidimensional Text Databases.
As the amount of textual information grows explosively in various kinds of business systems, it becomes more and more desirable to analyze both structured data records and unstruc...
ChengXiang Zhai, Duo Zhang, Jiawei Han
150
Voted
EUROSYS
2010
ACM
16 years 21 days ago
Splitter: A Proxy-based Approach for Post-Migration Testing of Web Applications
The benefits of virtualized IT environments, such as compute clouds, have drawn interested enterprises to migrate their applications onto new platforms to gain the advantages of ...
Xiaoning Ding, Hai Huang, Yaoping Ruan, Anees Shai...
119
Voted
ICCD
2008
IEEE
142views Hardware» more  ICCD 2008»
16 years 16 days ago
Making register file resistant to power analysis attacks
— Power analysis attacks are a type of side-channel attacks that exploits the power consumption of computing devices to retrieve secret information. They are very effective in br...
Shuo Wang, Fan Zhang, Jianwei Dai, Lei Wang, Zhiji...
« Prev « First page 2280 / 2417 Last » Next »