Sciweavers

2266 search results - page 448 / 454
» How Not to Evaluate a Developmental System
Sort
View
PVLDB
2010
342views more  PVLDB 2010»
13 years 7 months ago
CRIUS: User-Friendly Database Design
Non-technical users are increasingly adding structures to their data. This gives rise to the need for database design. However, traditional database design is deliberate and heavy...
Li Qian, Kristen LeFevre, H. V. Jagadish
TC
2010
13 years 7 months ago
PERFECTORY: A Fault-Tolerant Directory Memory Architecture
—The number of CPUs in chip multiprocessors is growing at the Moore’s Law rate, due to continued technology advances. However, new technologies pose serious reliability challen...
Hyunjin Lee, Sangyeun Cho, Bruce R. Childers
FDTC
2010
Springer
132views Cryptology» more  FDTC 2010»
13 years 7 months ago
Fault Injection Resilience
Fault injections constitute a major threat to the security of embedded systems. The errors in the cryptographic algorithms have been shown to be extremely dangerous, since powerful...
Sylvain Guilley, Laurent Sauvage, Jean-Luc Danger,...
CLEF
2009
Springer
13 years 6 months ago
Users' Image Seeking Behavior in a Multilingual Tag Environment
: This paper presents the results of a user study conducted in the framework of the Interactive Image Retrieval task at CLEF 2009. The main goal of our research is to understand th...
Miguel E. Ruiz, Pok Chin
ICDCS
2009
IEEE
13 years 6 months ago
The Case for Spam-Aware High Performance Mail Server Architecture
The email volume per mailbox has largely remained low and unchanged in the past several decades, and hence mail server performance has largely remained a secondary issue. The stee...
Abhinav Pathak, Syed Ali Raza Jafri, Y. Charlie Hu