Sciweavers

6181 search results - page 1219 / 1237
» Transactional Cluster Computing
Sort
View
KDD
1999
ACM
128views Data Mining» more  KDD 1999»
14 years 7 days ago
Towards Automated Synthesis of Data Mining Programs
Code synthesis is routinely used in industry to generate GUIs, form lling applications, and database support code and is even used with COBOL. In this paper we consider the questi...
Wray L. Buntine, Bernd Fischer 0002, Thomas Pressb...
SIGMOD
1998
ACM
140views Database» more  SIGMOD 1998»
14 years 6 days ago
Caching Multidimensional Queries Using Chunks
Caching has been proposed (and implemented) by OLAP systems in order to reduce response times for multidimensional queries. Previous work on such caching has considered table leve...
Prasad Deshpande, Karthikeyan Ramasamy, Amit Shukl...
ISCA
1997
IEEE
137views Hardware» more  ISCA 1997»
14 years 5 days ago
VM-Based Shared Memory on Low-Latency, Remote-Memory-Access Networks
Recent technological advances have produced network interfaces that provide users with very low-latency access to the memory of remote machines. We examine the impact of such netw...
Leonidas I. Kontothanassis, Galen C. Hunt, Robert ...
CASES
2007
ACM
13 years 12 months ago
Rethinking custom ISE identification: a new processor-agnostic method
The last decade has witnessed the emergence of the Application Specific Instruction-set Processor (ASIP) as a viable platform for embedded systems. Extensible ASIPs allow the user...
Ajay K. Verma, Philip Brisk, Paolo Ienne
ACNS
2006
Springer
87views Cryptology» more  ACNS 2006»
13 years 11 months ago
Effect of Malicious Synchronization
Abstract. We study the impact of malicious synchronization on computer systems that serve customers periodically. Systems supporting automatic periodic updates are common in web se...
Mun Choon Chan, Ee-Chien Chang, Liming Lu, Peng So...
« Prev « First page 1219 / 1237 Last » Next »