Sciweavers

434 search results - page 86 / 87
» From sequential programs to multi-tier applications by progr...
Sort
View
SIGMOD
2002
ACM
236views Database» more  SIGMOD 2002»
14 years 7 months ago
The Cougar Approach to In-Network Query Processing in Sensor Networks
The widespread distribution and availability of smallscale sensors, actuators, and embedded processors is transforming the physical world into a computing platform. One such examp...
Yong Yao, Johannes Gehrke
ICPR
2004
IEEE
14 years 8 months ago
Alignment of Multiple Non-Overlapping Axially Symmetric 3D Datasets
Uknown to us, an axially-symmetric surface is broken into disjoint pieces along a set of break-curves, i.e., the curves along which the surface locally breaks into two pieces. A s...
Andrew R. Willis, David B. Cooper
STOC
2007
ACM
101views Algorithms» more  STOC 2007»
14 years 7 months ago
The price of privacy and the limits of LP decoding
This work is at the intersection of two lines of research. One line, initiated by Dinur and Nissim, investigates the price, in accuracy, of protecting privacy in a statistical dat...
Cynthia Dwork, Frank McSherry, Kunal Talwar
CGO
2008
IEEE
14 years 1 months ago
Spice: speculative parallel iteration chunk execution
The recent trend in the processor industry of packing multiple processor cores in a chip has increased the importance of automatic techniques for extracting thread level paralleli...
Easwaran Raman, Neil Vachharajani, Ram Rangan, Dav...
CLUSTER
2003
IEEE
14 years 12 days ago
Compiler Optimized Remote Method Invocation
We further increase the efficiency of Java RMI programs. Where other optimizing re-implementations of RMI use pre-processors to create stubs and skeletons and to create class spe...
Ronald Veldema, Michael Philippsen