Sciweavers

840 search results - page 127 / 168
» Universal Metadata Standard
Sort
View
SIGCSE
2009
ACM
144views Education» more  SIGCSE 2009»
14 years 9 months ago
A model academic ethics and integrity policy for computer science departments
For decades, US universities and colleges have had policies pertaining to the conduct of their students at the institutional level. These policies are referred to as Academic Inte...
Charles Riedesel, Eric D. Manley, Susan Poser, Jit...
HPCA
2003
IEEE
14 years 9 months ago
Variability in Architectural Simulations of Multi-Threaded Workloads
Multi-threaded commercial workloads implement many important internet services. Consequently, these workloads are increasingly used to evaluate the performance of uniprocessor and...
Alaa R. Alameldeen, David A. Wood
STOC
2006
ACM
244views Algorithms» more  STOC 2006»
14 years 9 months ago
Approximate nearest neighbors and the fast Johnson-Lindenstrauss transform
We introduce a new low-distortion embedding of d 2 into O(log n) p (p = 1, 2), called the Fast-Johnson-LindenstraussTransform. The FJLT is faster than standard random projections ...
Nir Ailon, Bernard Chazelle
VLDB
2002
ACM
139views Database» more  VLDB 2002»
14 years 9 months ago
TIMBER: A native XML database
Abstract This paper describes the overall design and architecture of the Timber XML database system currently being implemented at the University of Michigan. The system is based u...
H. V. Jagadish, Shurug Al-Khalifa, Adriane Chapman...
CCS
2009
ACM
14 years 3 months ago
Computational soundness for key exchange protocols with symmetric encryption
Formal analysis of security protocols based on symbolic models has been very successful in finding flaws in published protocols and proving protocols secure, using automated too...
Ralf Küsters, Max Tuengerthal