Sciweavers

1644 search results - page 201 / 329
» Finding Dominators in Practice
Sort
View
PLDI
2010
ACM
14 years 1 months ago
Detecting Inefficiently-Used Containers to Avoid Bloat
Runtime bloat degrades significantly the performance and scalability of software systems. An important source of bloat is the inefficient use of containers. It is expensive to cre...
Guoqing Xu, Atanas Rountev
BMCBI
2008
175views more  BMCBI 2008»
13 years 9 months ago
Synonym set extraction from the biomedical literature by lexical pattern discovery
Background: Although there are a large number of thesauri for the biomedical domain many of them lack coverage in terms and their variant forms. Automatic thesaurus construction b...
John McCrae, Nigel Collier
CORR
2010
Springer
173views Education» more  CORR 2010»
13 years 9 months ago
Local search for stable marriage problems
The stable marriage (SM) problem has a wide variety of practical applications, ranging from matching resident doctors to hospitals, to matching students to schools, or more genera...
Mirco Gelain, Maria Silvia Pini, Francesca Rossi, ...
MANSCI
2008
169views more  MANSCI 2008»
13 years 8 months ago
Service Adoption and Pricing of Content Delivery Network (CDN) Services
Content Delivery Networks (CDNs) are a vital component of the Internet's content delivery value chain, servicing nearly a third of the Internet's most popular content si...
Kartik Hosanagar, John C.-I. Chuang, Ramayya Krish...
ASIACRYPT
2010
Springer
13 years 7 months ago
Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2
We revisit narrow-pipe designs that are in practical use, and their security against preimage attacks. Our results are the best known preimage attacks on Tiger, MD4, and reduced SH...
Jian Guo, San Ling, Christian Rechberger, Huaxiong...