Sciweavers

544 search results - page 31 / 109
» Reading to Write
Sort
View
142
Voted
CASES
2005
ACM
15 years 4 months ago
Exploiting pipelining to relax register-file port constraints of instruction-set extensions
Customisable embedded processors are becoming available on the market, thus making it possible for designers to speed up execution of applications by using Application-specific F...
Laura Pozzi, Paolo Ienne
SIGMOD
1999
ACM
94views Database» more  SIGMOD 1999»
15 years 7 months ago
Logical Logging to Extend Recovery to New Domains
Recovery can be extended to new domains at reduced logging cost by exploiting "logical" log operations. During recovery, a logical log operation may read data values fro...
David B. Lomet, Mark R. Tuttle
NAACL
2010
15 years 23 days ago
Utility Evaluation of Cross-document Information Extraction
We describe a utility evaluation to determine whether cross-document information extraction (IE) techniques measurably improve user performance in news summary writing. Two groups...
Heng Ji, Zheng Chen, Jonathan Feldman, Antonio Gon...
ECOOP
2008
Springer
15 years 4 months ago
Regional Logic for Local Reasoning about Global Invariants
Shared mutable objects pose grave challenges in reasoning, especially for data abstraction and modularity. This paper presents a novel logic for erroravoiding partial correctness o...
Anindya Banerjee, David A. Naumann, Stan Rosenberg
TCC
2009
Springer
130views Cryptology» more  TCC 2009»
16 years 3 months ago
How Efficient Can Memory Checking Be?
We consider the problem of memory checking, where a user wants to maintain a large database on a remote server but has only limited local storage. The user wants to use the small ...
Cynthia Dwork, Moni Naor, Guy N. Rothblum, Vinod V...