Sciweavers

6181 search results - page 1219 / 1237
» Transactional Cluster Computing
Sort
View
137
Voted
KDD
1999
ACM
128views Data Mining» more  KDD 1999»
15 years 6 months ago
Towards Automated Synthesis of Data Mining Programs
Code synthesis is routinely used in industry to generate GUIs, form lling applications, and database support code and is even used with COBOL. In this paper we consider the questi...
Wray L. Buntine, Bernd Fischer 0002, Thomas Pressb...
SIGMOD
1998
ACM
140views Database» more  SIGMOD 1998»
15 years 6 months ago
Caching Multidimensional Queries Using Chunks
Caching has been proposed (and implemented) by OLAP systems in order to reduce response times for multidimensional queries. Previous work on such caching has considered table leve...
Prasad Deshpande, Karthikeyan Ramasamy, Amit Shukl...
ISCA
1997
IEEE
137views Hardware» more  ISCA 1997»
15 years 6 months ago
VM-Based Shared Memory on Low-Latency, Remote-Memory-Access Networks
Recent technological advances have produced network interfaces that provide users with very low-latency access to the memory of remote machines. We examine the impact of such netw...
Leonidas I. Kontothanassis, Galen C. Hunt, Robert ...
134
Voted
CASES
2007
ACM
15 years 6 months ago
Rethinking custom ISE identification: a new processor-agnostic method
The last decade has witnessed the emergence of the Application Specific Instruction-set Processor (ASIP) as a viable platform for embedded systems. Extensible ASIPs allow the user...
Ajay K. Verma, Philip Brisk, Paolo Ienne
115
Voted
ACNS
2006
Springer
87views Cryptology» more  ACNS 2006»
15 years 6 months ago
Effect of Malicious Synchronization
Abstract. We study the impact of malicious synchronization on computer systems that serve customers periodically. Systems supporting automatic periodic updates are common in web se...
Mun Choon Chan, Ee-Chien Chang, Liming Lu, Peng So...
« Prev « First page 1219 / 1237 Last » Next »