Sciweavers

7430 search results - page 1400 / 1486
» Programming Applications in CIFF
Sort
View
ISCA
2010
IEEE
236views Hardware» more  ISCA 2010»
14 years 2 months ago
Elastic cooperative caching: an autonomous dynamically adaptive memory hierarchy for chip multiprocessors
Next generation tiled microarchitectures are going to be limited by off-chip misses and by on-chip network usage. Furthermore, these platforms will run an heterogeneous mix of ap...
Enric Herrero, José González, Ramon ...
ISMAR
2002
IEEE
14 years 2 months ago
Augmented Chemistry: An Interactive Educational Workbench
This system paper reports on some of the advantages tangible interaction can bring to chemistry education. The paper describes the realisation of an in-house designed Tangible Use...
Morten Fjeld, Benedikt M. Voegtli
SACMAT
2010
ACM
14 years 2 months ago
Role-based access control (RBAC) in Java via proxy objects using annotations
We propose a new approach for applying Role-Based Access Control (RBAC) to methods in objects in the Java programming language. In our approach, a policy implementer (usually a de...
Jeff Zarnett, Mahesh V. Tripunitara, Patrick Lam
SIGMOD
2010
ACM
211views Database» more  SIGMOD 2010»
14 years 2 months ago
Enterprise information extraction: recent developments and open challenges
Information extraction (IE) — the problem of extracting structured information from unstructured text — has become an increasingly important topic in recent years. A SIGMOD 20...
Laura Chiticariu, Yunyao Li, Sriram Raghavan, Fred...
EDBT
2009
ACM
156views Database» more  EDBT 2009»
14 years 2 months ago
Evaluating very large datalog queries on social networks
We consider a near future scenario in which users of a Web 2.0 application, such as a social network, contribute to the application not only data, but also rules which automatical...
Royi Ronen, Oded Shmueli
« Prev « First page 1400 / 1486 Last » Next »