Sciweavers

70 search results - page 11 / 14
» Way Stealing:cache-assisted automatic instruction set extens...
Sort
View
ICDE
2007
IEEE
219views Database» more  ICDE 2007»
14 years 9 months ago
Efficient Keyword Search Across Heterogeneous Relational Databases
Keyword search is a familiar and potentially effective way to find information of interest that is "locked" inside relational databases. Current work has generally assum...
Mayssam Sayyadian, Hieu LeKhac, AnHai Doan, Luis G...
SIGOPS
2011
255views Hardware» more  SIGOPS 2011»
13 years 2 months ago
Bridging functional heterogeneity in multicore architectures
Heterogeneous processors that mix big high performance cores with small low power cores promise excellent single– threaded performance coupled with high multi–threaded through...
Dheeraj Reddy, David A. Koufaty, Paul Brett, Scott...
EMNLP
2011
12 years 7 months ago
Watermarking the Outputs of Structured Prediction with an application in Statistical Machine Translation
We propose a general method to watermark and probabilistically identify the structured outputs of machine learning algorithms. Our method is robust to local editing operations and...
Ashish Venugopal, Jakob Uszkoreit, David Talbot, F...
BMCBI
2006
109views more  BMCBI 2006»
13 years 7 months ago
iHOPerator: user-scripting a personalized bioinformatics Web, starting with the iHOP website
Background: User-scripts are programs stored in Web browsers that can manipulate the content of websites prior to display in the browser. They provide a novel mechanism by which u...
Benjamin M. Good, Edward A. Kawas, Byron Yu-Lin Ku...
ICSM
2009
IEEE
14 years 2 months ago
Detection and analysis of near-miss software clones
Software clones are considered harmful in software maintenance and evolution. However, despite a decade of active research, there is a marked lack of work in the detection and ana...
Chanchal K. Roy