Sciweavers

1818 search results - page 311 / 364
» How users use access control
Sort
View
ACL2
2006
ACM
14 years 3 months ago
Implementing a cost-aware evaluator for ACL2 expressions
One of ACL2’s most interesting features is that it is executable, so users can run the programs that they verify, and debug them during verification. In fact, the ACL2 implemen...
Ruben Gamboa, John R. Cowles
VLDB
2004
ACM
73views Database» more  VLDB 2004»
14 years 2 months ago
Multi-objective Query Processing for Database Systems
Query processing in database systems has developed beyond mere exact matching of attribute values. Scoring database objects and retrieving only the top k matches or Pareto-optimal...
Wolf-Tilo Balke, Ulrich Güntzer
MM
2003
ACM
118views Multimedia» more  MM 2003»
14 years 2 months ago
Generation of interactive multi-level video summaries
In this paper, we describe how a detail-on-demand representation for interactive video is used in video summarization. Our approach automatically generates a hypervideo composed o...
Frank M. Shipman III, Andreas Girgensohn, Lynn Wil...
DIGITALCITIES
2003
Springer
14 years 2 months ago
Visualizing Social Patterns in Virtual Environments on a Local and Global Scale
Today a wide variety of virtual worlds, cities, gaming environments etc. exist and become part of life of their human inhabitants. However, our understanding on how technology infl...
Katy Börner, Shashikant Penumarthy, Bonnie Je...
HPCA
2000
IEEE
14 years 1 months ago
Coherence Communication Prediction in Shared-Memory Multiprocessors
Abstract—Sharing patterns in shared-memory multiprocessors are the key to performance: uniprocessor latencytolerating techniques such as out-of-order execution and non-blocking c...
Stefanos Kaxiras, Cliff Young