Sciweavers

988 search results - page 195 / 198
» The Frontiers of Data Programmability
Sort
View
TRECVID
2008
13 years 11 months ago
University of Sheffield at TRECVID 2008: Rushes Summarisation and Video Copy Detection
This paper presents our experiments on TRECVID workshop 2008. This year we participated in two challenging tasks, rushes video summarisation and video copy detection tasks. We stu...
Siripinyo Chantamunee, Yoshihiko Gotoh
CASCON
1996
148views Education» more  CASCON 1996»
13 years 11 months ago
Reuse in the application layer
Today's advanced CASE tools, combining the building-block and generative approaches to software reuse, are effective for reuse of software components and procedures in the pr...
Hirotomo Okuno, Hideki Matsumoto, Hironori Asai, M...
SOQUA
2007
13 years 11 months ago
ConTest listeners: a concurrency-oriented infrastructure for Java test and heal tools
With the proliferation of the new multi-core personal computers, and the explosion of the usage of highly concurrent machine configuration, concurrent code moves from being writt...
Yarden Nir-Buchbinder, Shmuel Ur
CCGRID
2010
IEEE
13 years 11 months ago
Region-Based Prefetch Techniques for Software Distributed Shared Memory Systems
Although shared memory programming models show good programmability compared to message passing programming models, their implementation by page-based software distributed shared m...
Jie Cai, Peter E. Strazdins, Alistair P. Rendell
ICFP
2010
ACM
13 years 11 months ago
Distance makes the types grow stronger: a calculus for differential privacy
We want assurances that sensitive information will not be disclosed when aggregate data derived from a database is published. Differential privacy offers a strong statistical guar...
Jason Reed, Benjamin C. Pierce