Sciweavers

8636 search results - page 1636 / 1728
» How Developers Copy
Sort
View
117
Voted
SIGMOD
2010
ACM
170views Database» more  SIGMOD 2010»
15 years 7 months ago
Querying data provenance
Many advanced data management operations (e.g., incremental maintenance, trust assessment, debugging schema mappings, keyword search over databases, or query answering in probabil...
Grigoris Karvounarakis, Zachary G. Ives, Val Tanne...
118
Voted
SPAA
2010
ACM
15 years 7 months ago
Towards optimizing energy costs of algorithms for shared memory architectures
Energy consumption by computer systems has emerged as an important concern. However, the energy consumed in executing an algorithm cannot be inferred from its performance alone: i...
Vijay Anand Korthikanti, Gul Agha
140
Voted
GECCO
2010
Springer
254views Optimization» more  GECCO 2010»
15 years 7 months ago
Evolving viral marketing strategies
One method of viral marketing involves seeding certain consumers within a population to encourage faster adoption of the product throughout the entire population. However, determi...
Forrest Stonedahl, William Rand, Uri Wilensky
101
Voted
ICA3PP
2010
Springer
15 years 7 months ago
Modular Resultant Algorithm for Graphics Processors
Abstract. In this paper we report on the recent progress in computing bivariate polynomial resultants on Graphics Processing Units (GPU). Given two polynomials in Z[x, y], our algo...
Pavel Emeliyanenko
119
Voted
ICALP
2010
Springer
15 years 7 months ago
Concurrent Knowledge Extraction in the Public-Key Model
Knowledge extraction is a fundamental notion, modeling machine possession of values (witnesses) in a computational complexity sense and enabling one to argue about the internal st...
Andrew C. Yao, Moti Yung, Yunlei Zhao
« Prev « First page 1636 / 1728 Last » Next »