Sciweavers

1992 search results - page 350 / 399
» Implementing sorting in database systems
Sort
View
ISCA
2008
IEEE
143views Hardware» more  ISCA 2008»
13 years 7 months ago
TokenTM: Efficient Execution of Large Transactions with Hardware Transactional Memory
Current hardware transactional memory systems seek to simplify parallel programming, but assume that large transactions are rare, so it is acceptable to penalize their performance...
Jayaram Bobba, Neelam Goyal, Mark D. Hill, Michael...
COMPSEC
2007
52views more  COMPSEC 2007»
13 years 7 months ago
Privacy-preserving programming using sython
— Programmers often have access to confidential data that are not strictly needed for program development. Broad priveleges from accounts given to programmers allow them to view...
Michael Gaiman, Rahul Simha, Bhagirath Narahari
TSE
2008
89views more  TSE 2008»
13 years 7 months ago
WASP: Protecting Web Applications Using Positive Tainting and Syntax-Aware Evaluation
Many software systems have evolved to include a Web-based component that makes them available to the public via the Internet and can expose them to a variety of Web-based attacks. ...
William G. J. Halfond, Alessandro Orso, Pete Manol...
PRL
2000
104views more  PRL 2000»
13 years 7 months ago
PicSOM - content-based image retrieval with self-organizing maps
We have developed a novel system for content-based image retrieval in large, unannotated databases. The system is called PicSOM, and it is based on tree structured self-organizing...
Jorma Laaksonen, Markus Koskela, Sami Laakso, Erkk...
ICASSP
2010
IEEE
13 years 6 months ago
Real-time content adaptive contrast enhancement for see-through fog and rain
In this paper we present a novel algorithm for improving the visibility of surveillance videos degraded by fog and/or rain. The proposed algorithm adaptively enhances the global a...
Zhen Jia, Hongcheng Wang, Rodrigo Caballero, Ziyou...