Sciweavers

6248 search results - page 1169 / 1250
» Programming in a data factory
Sort
View
ISD
1999
Springer
149views Database» more  ISD 1999»
14 years 2 months ago
Cost-Effective Determination of Biomass from Aerial Images
This paper describes an ongoing collaborative research program between the Computer Science and the Forestry and Wildlife Management Departments at the University of Massachusetts...
Howard J. Schultz, Dana Slaymaker, Chris Holmes, F...
ISLPED
1997
ACM
108views Hardware» more  ISLPED 1997»
14 years 2 months ago
Techniques for low energy software
The energy consumption of a system depends upon the hardware and software component of a system. Since it is the software which drives the hardware in most systems, decisions take...
Huzefa Mehta, Robert Michael Owens, Mary Jane Irwi...
VLDB
1994
ACM
121views Database» more  VLDB 1994»
14 years 2 months ago
An Overview of Repository Technology
A repository is a shareddatabaseof information aboutengineeredartifacts.Wedefinea repository manager to be a databaseapplication that suPports checkout/checkin, version and config...
Philip A. Bernstein, Umeshwar Dayal
DASFAA
2007
IEEE
165views Database» more  DASFAA 2007»
14 years 2 months ago
Making the Most of Cache Groups
Cache groups are a powerful concept for database caching, which is used to relieve the backend database load and to keep referenced data close to the application programs at the &q...
Andreas Bühmann, Theo Härder
SP
2010
IEEE
174views Security Privacy» more  SP 2010»
14 years 2 months ago
HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity
— Virtualization is being widely adopted in today’s computing systems. Its unique security advantages in isolating and introspecting commodity OSes as virtual machines (VMs) ha...
Zhi Wang, Xuxian Jiang
« Prev « First page 1169 / 1250 Last » Next »