Sciweavers

270 search results - page 49 / 54
» Idea: Efficient Evaluation of Access Control Constraints
Sort
View
SIGMOD
2009
ACM
220views Database» more  SIGMOD 2009»
14 years 7 months ago
Keyword search in databases: the power of RDBMS
Keyword search in relational databases (RDBs) has been extensively studied recently. A keyword search (or a keyword query) in RDBs is specified by a set of keywords to explore the...
Lu Qin, Jeffrey Xu Yu, Lijun Chang
BMCBI
2006
137views more  BMCBI 2006»
13 years 7 months ago
A maximum likelihood framework for protein design
Background: The aim of protein design is to predict amino-acid sequences compatible with a given target structure. Traditionally envisioned as a purely thermodynamic question, thi...
Claudia L. Kleinman, Nicolas Rodrigue, Céci...
PPOPP
2010
ACM
14 years 4 months ago
Scheduling support for transactional memory contention management
Transactional Memory (TM) is considered as one of the most promising paradigms for developing concurrent applications. TM has been shown to scale well on multiple cores when the d...
Walther Maldonado, Patrick Marlier, Pascal Felber,...
JIPS
2006
126views more  JIPS 2006»
13 years 7 months ago
TASL: A Traffic-Adapted Sleep/Listening MAC Protocol for Wireless Sensor Network
In this paper, we proposed a MAC protocol, which can dynamically adjust Listening/Sleeping time rate of wireless sensor nodes according to data traffic load. In sensor networks, se...
Yuan Yang, Zhen Fu, Tae-Seok Lee, Myong-Soon Park
CHI
2004
ACM
14 years 8 months ago
Automatic support for web user studies with SCONE and TEA
This paper describes the concepts of TEA, a flexible tool that supports user tests by automating repetitive tasks and collecting data of user inputs and actions. TEA was specifica...
Hartmut Obendorf, Harald Weinreich, Torsten Hass