Sciweavers

5843 search results - page 1137 / 1169
» Software Security in Practice
Sort
View
KDD
2008
ACM
176views Data Mining» more  KDD 2008»
14 years 8 months ago
Febrl -: an open source data cleaning, deduplication and record linkage system with a graphical user interface
Matching records that refer to the same entity across databases is becoming an increasingly important part of many data mining projects, as often data from multiple sources needs ...
Peter Christen
HPCA
2006
IEEE
14 years 8 months ago
Phase characterization for power: evaluating control-flow-based and event-counter-based techniques
Computer systems increasingly rely on dynamic, phasebased system management techniques, in which system hardware and software parameters may be altered or tuned at runtime for dif...
Canturk Isci, Margaret Martonosi
POPL
2008
ACM
14 years 8 months ago
Multiparty asynchronous session types
Communication is becoming one of the central elements in software development. As a potential typed foundation for structured communication-centred programming, session types have...
Kohei Honda, Nobuko Yoshida, Marco Carbone
POPL
2006
ACM
14 years 8 months ago
Autolocker: synchronization inference for atomic sections
The movement to multi-core processors increases the need for simpler, more robust parallel programming models. Atomic sections have been widely recognized for their ease of use. T...
Bill McCloskey, Feng Zhou, David Gay, Eric A. Brew...
ICFP
2007
ACM
14 years 7 months ago
Bidirectionalization transformation based on automatic derivation of view complement functions
Bidirectional transformation is a pair of transformations: a view function and a backward transformation. A view function maps one data structure called source onto another called...
Kazutaka Matsuda, Zhenjiang Hu, Keisuke Nakano, Ma...
« Prev « First page 1137 / 1169 Last » Next »