Sciweavers

7329 search results - page 1383 / 1466
» Software Architectural Transformation
Sort
View
127
Voted
UIST
2004
ACM
15 years 9 months ago
Citrine: providing intelligent copy-and-paste
We present Citrine, a system that extends the widespread copy-and-paste interaction technique with intelligent transformations, making it useful in more situations. Citrine uses t...
Jeffrey Stylos, Brad A. Myers, Andrew Faulring
142
Voted
LCPC
2004
Springer
15 years 9 months ago
Empirical Performance-Model Driven Data Layout Optimization
Abstract. Empirical optimizers like ATLAS have been very effective in optimizing computational kernels in libraries. The best choice of parameters such as tile size and degree of l...
Qingda Lu, Xiaoyang Gao, Sriram Krishnamoorthy, Ge...
132
Voted
OOPSLA
2004
Springer
15 years 9 months ago
Transparent proxies for java futures
A proxy object is a surrogate or placeholder that controls access to another target object. Proxies can be used to support distributed programming, lazy or parallel evaluation, ac...
Polyvios Pratikakis, Jaime Spacco, Michael W. Hick...
135
Voted
HICSS
2003
IEEE
176views Biometrics» more  HICSS 2003»
15 years 8 months ago
Ad-Hoc Association-Rule Mining within the Data Warehouse
Many organizations often underutilize their already constructed data warehouses. In this paper, we suggest a novel way of acquiring more information from corporate data warehouses...
Svetlozar Nestorov, Nenad Jukic
137
Voted
IEEEINTERACT
2003
IEEE
15 years 8 months ago
A Region-Based Compilation Infrastructure
: The traditional framework for back-end compilation is based on the scope of functions, which is a natural boundary to partition an entire program for compilation. However, the si...
Yang Liu, Zhaoqing Zhang, Ruliang Qiao, Roy Dz-Chi...
« Prev « First page 1383 / 1466 Last » Next »