Sciweavers

13863 search results - page 2700 / 2773
» Providing Database as a Service
Sort
View
PLDI
2011
ACM
14 years 7 months ago
EnerJ: approximate data types for safe and general low-power computation
Energy is increasingly a first-order concern in computer systems. Exploiting energy-accuracy trade-offs is an attractive choice in applications that can tolerate inaccuracies. Re...
Adrian Sampson, Werner Dietl, Emily Fortuna, Danus...
PODC
2011
ACM
14 years 7 months ago
Analyzing consistency properties for fun and profit
:  Analyzing Consistency Properties for Fun and Profit Wojciech Golab, Xiaozhou Li, Mehul A. Shah HP Laboratories HPL-2011-6 data consistency, algorightms, key-value stores Moti...
Wojciech M. Golab, Xiaozhou Li, Mehul A. Shah
SIGMETRICS
2011
ACM
161views Hardware» more  SIGMETRICS 2011»
14 years 6 months ago
Modeling program resource demand using inherent program characteristics
The workloads in modern Chip-multiprocessors (CMP) are becoming increasingly diversified, creating different resource demands on hardware substrate. It is necessary to allocate h...
Jian Chen, Lizy Kurian John, Dimitris Kaseridis
ALDT
2011
Springer
251views Algorithms» more  ALDT 2011»
14 years 4 months ago
Game Theory and Human Behavior: Challenges in Security and Sustainability
Security and sustainability are two critical global challenges that involve the interaction of many intelligent actors. Game theory provides a sound mathematical framework to model...
Rong Yang, Milind Tambe, Manish Jain, Jun-young Kw...
CCS
2011
ACM
14 years 4 months ago
Fashion crimes: trending-term exploitation on the web
Online service providers are engaged in constant conflict with miscreants who try to siphon a portion of legitimate traffic to make illicit profits. We study the abuse of “tr...
Tyler Moore, Nektarios Leontiadis, Nicolas Christi...
« Prev « First page 2700 / 2773 Last » Next »