Sciweavers

5518 search results - page 1102 / 1104
» Rule-Based Service Modeling
Sort
View
NAR
2011
225views Computer Vision» more  NAR 2011»
12 years 10 months ago
Gramene database in 2010: updates and extensions
Now in its 10th year, the Gramene database (http:// www.gramene.org) has grown from its primary focus on rice, the first fully-sequenced grass genome, to become a resource for maj...
Ken Youens-Clark, Edward S. Buckler, Terry M. Cass...
PLDI
2011
ACM
12 years 10 months ago
EnerJ: approximate data types for safe and general low-power computation
Energy is increasingly a first-order concern in computer systems. Exploiting energy-accuracy trade-offs is an attractive choice in applications that can tolerate inaccuracies. Re...
Adrian Sampson, Werner Dietl, Emily Fortuna, Danus...
CCS
2011
ACM
12 years 7 months ago
Fashion crimes: trending-term exploitation on the web
Online service providers are engaged in constant conflict with miscreants who try to siphon a portion of legitimate traffic to make illicit profits. We study the abuse of “tr...
Tyler Moore, Nektarios Leontiadis, Nicolas Christi...
SIGMOD
2012
ACM
242views Database» more  SIGMOD 2012»
11 years 10 months ago
Dynamic management of resources and workloads for RDBMS in cloud: a control-theoretic approach
As cloud computing environments become explosively popular, dealing with unpredictable changes, uncertainties, and disturbances in both systems and environments turns out to be on...
Pengcheng Xiong
SIGMOD
2012
ACM
220views Database» more  SIGMOD 2012»
11 years 10 months ago
GUPT: privacy preserving data analysis made easy
It is often highly valuable for organizations to have their data analyzed by external agents. However, any program that computes on potentially sensitive data risks leaking inform...
Prashanth Mohan, Abhradeep Thakurta, Elaine Shi, D...
« Prev « First page 1102 / 1104 Last » Next »