Sciweavers

1812 search results - page 146 / 363
» Test Early, Test Often
Sort
View
150
Voted
EDBT
2004
ACM
155views Database» more  EDBT 2004»
16 years 4 months ago
Processing Unions of Conjunctive Queries with Negation under Limited Access Patterns
We study the problem of answering queries over sources with limited access patterns. The problem is to decide whether a given query Q is feasible, i.e., equivalent to an executable...
Alan Nash, Bertram Ludäscher
ICCD
2005
IEEE
246views Hardware» more  ICCD 2005»
16 years 29 days ago
H-SIMD Machine: Configurable Parallel Computing for Matrix Multiplication
FPGAs (Field-Programmable Gate Arrays) are often used as coprocessors to boost the performance of dataintensive applications [1, 2]. However, mapping algorithms onto multimillion-...
Xizhen Xu, Sotirios G. Ziavras
AINA
2009
IEEE
15 years 11 months ago
Quantifying Artifacts of Virtualization: A Framework for Mirco-Benchmarks
One of the novel benefits of virtualization is the ability to emulate many hosts with a single physical machine. This approach is often used to support at-scale testing for large...
Chris Matthews, Yvonne Coady, Stephen Neville
TEI
2009
ACM
127views Hardware» more  TEI 2009»
15 years 11 months ago
Living interfaces: the impatient toaster
This paper introduces the Impatient Toaster, a kitchen appliance designed to motivate its owners to eat more often and in regular intervals: After not using it for a while, it sig...
Eva Burneleit, Fabian Hemmert, Reto Wettach
132
Voted
WSDM
2009
ACM
112views Data Mining» more  WSDM 2009»
15 years 11 months ago
Finding text reuse on the web
With the overwhelming number of reports on similar events originating from different sources on the web, it is often hard, using existing web search paradigms, to find the origi...
Michael Bendersky, W. Bruce Croft