Sciweavers

206 search results - page 37 / 42
» Sharing in the Weak Lambda-Calculus
Sort
View
SIGMOD
1999
ACM
99views Database» more  SIGMOD 1999»
14 years 3 months ago
Belief Reasoning in MLS Deductive Databases
It is envisaged that the application of the multilevel security (MLS) scheme will enhance exibility and e ectiveness of authorization policies in shared enterprise databases and w...
Hasan M. Jamil
CHI
1993
ACM
14 years 2 months ago
An evaluation of earcons for use in auditory human-computer interfaces
An evaluation of earcons was carried out to see whether they are an effective means of communicating information in sound. An initial experiment showed that earcons were better th...
Stephen A. Brewster, Peter C. Wright, Alistair D. ...
VLDB
1994
ACM
126views Database» more  VLDB 1994»
14 years 2 months ago
Building a Laboratory Information System Around a C++-Based Object-Oriented DBMS
MapBase is a laboratory information system that has been supporting a high-throughput genome-mapping operation for the last three years. We chose to build MapBase around a C++-bas...
Nathan Goodman, Steve Rozen, Lincoln Stein
CASES
2001
ACM
14 years 2 months ago
Transparent data-memory organizations for digital signal processors
Today's digital signal processors (DSPs), unlike general-purpose processors, use a non-uniform addressing model in which the primary components of the memory system--the DRAM...
Sadagopan Srinivasan, Vinodh Cuppu, Bruce L. Jacob
APPROX
2010
Springer
139views Algorithms» more  APPROX 2010»
14 years 12 days ago
Two-Source Extractors Secure against Quantum Adversaries
We initiate the study of multi-source extractors in the quantum world. In this setting, our goal is to extract random bits from two independent weak random sources, on which two q...
Roy Kasher, Julia Kempe