Sciweavers

2512 search results - page 337 / 503
» Software Transactional Memory
Sort
View
118
Voted
SOUPS
2005
ACM
15 years 8 months ago
The battle against phishing: Dynamic Security Skins
Phishing is a model problem for illustrating usability concerns of privacy and security because both system designers and attackers battle using user interfaces to guide (or misgu...
Rachna Dhamija, J. Doug Tygar
126
Voted
ISCA
2000
IEEE
103views Hardware» more  ISCA 2000»
15 years 7 months ago
Piranha: a scalable architecture based on single-chip multiprocessing
The microprocessor industry is currently struggling with higher development costs and longer design times that arise from exceedingly complex processors that are pushing the limit...
Luiz André Barroso, Kourosh Gharachorloo, R...
IDEAS
1999
IEEE
144views Database» more  IDEAS 1999»
15 years 6 months ago
The Scalability of an Object Descriptor Architecture OODBMS
An object database management system (OODBMS) has been often criticized for its alleged insufficient scalability for a large-scale production system. We investigated the scalabili...
Kwok K. Yu, Byung Suk Lee, Michael R. Olson
165
Voted
SPAA
1997
ACM
15 years 6 months ago
A Localized Algorithm for Parallel Association Mining
Discovery of association rules is an important database mining problem. Mining for association rules involves extracting patterns from large databases and inferring useful rules f...
Mohammed Javeed Zaki, Srinivasan Parthasarathy, We...
147
Voted
HOTOS
1993
IEEE
15 years 6 months ago
Object Groups May Be Better Than Pages
I argue against trying to solve the problem of clustering objects into disk pages. Instead, I propose that objects be fetched in groups that may be specific to an application or ...
Mark Day