Sciweavers

10934 search results - page 2138 / 2187
» High performance computing and communications
Sort
View
ASPLOS
2004
ACM
14 years 2 months ago
Devirtualizable virtual machines enabling general, single-node, online maintenance
Maintenance is the dominant source of downtime at high availability sites. Unfortunately, the dominant mechanism for reducing this downtime, cluster rolling upgrade, has two short...
David E. Lowell, Yasushi Saito, Eileen J. Samberg
ITICSE
2004
ACM
14 years 2 months ago
SQLator: an online SQL learning workbench
SQL (Structured Query Language) is one of the essential topics in foundation databases courses in higher education. Due to its apparent simple syntax, learning to use the full pow...
Shazia Wasim Sadiq, Maria E. Orlowska, Wasim Sadiq...
JCDL
2004
ACM
125views Education» more  JCDL 2004»
14 years 2 months ago
Generating fuzzy semantic metadata describing spatial relations from images using the R-histogram
Automatic generation of semantic metadata describing spatial relations is highly desirable for image digital libraries. Relative spatial relations between objects in an image conv...
Yuhang Wang, Fillia Makedon, James Ford, Li Shen, ...
PLDI
2004
ACM
14 years 2 months ago
Cloning-based context-sensitive pointer alias analysis using binary decision diagrams
This paper presents the first scalable context-sensitive, inclusionbased pointer alias analysis for Java programs. Our approach to context sensitivity is to create a clone of a m...
John Whaley, Monica S. Lam
CCS
2004
ACM
14 years 2 months ago
KNOW Why your access was denied: regulating feedback for usable security
We examine the problem of providing useful feedback about access control decisions to users while controlling the disclosure of the system’s security policies. Relevant feedback...
Apu Kapadia, Geetanjali Sampemane, Roy H. Campbell
« Prev « First page 2138 / 2187 Last » Next »