Sciweavers

759 search results - page 128 / 152
» What Can Be Implemented Anonymously
Sort
View
SSDBM
2008
IEEE
149views Database» more  SSDBM 2008»
14 years 4 months ago
Query Planning for Searching Inter-dependent Deep-Web Databases
Increasingly, many data sources appear as online databases, hidden behind query forms, thus forming what is referred to as the deep web. It is desirable to have systems that can pr...
Fan Wang, Gagan Agrawal, Ruoming Jin
HIPEAC
2007
Springer
14 years 4 months ago
A Throughput-Driven Task Creation and Mapping for Network Processors
Abstract. Network processors are programmable devices that can process packets at a high speed. A network processor is typified by multithreading and heterogeneous multiprocessing...
Lixia Liu, Xiao-Feng Li, Michael K. Chen, Roy Dz-C...
ACSAC
2006
IEEE
14 years 4 months ago
A Module System for Isolating Untrusted Software Extensions
With the recent advent of dynamically extensible software systems, in which software extensions may be dynamically loaded into the address space of a core application to augment i...
Philip W. L. Fong, Simon A. Orr
ELPUB
2006
ACM
14 years 3 months ago
CityInMyPocket: Digital Walking Guides
By the end of this year visitors to the Flemish town of Mechelen can discover the city with the help of the new CityInMyPocket walking guide. Instead of following a person or a bo...
Steven Depuydt, Jeroen Vanattenhoven, Jan Engelen
ISCA
2005
IEEE
141views Hardware» more  ISCA 2005»
14 years 3 months ago
RegionScout: Exploiting Coarse Grain Sharing in Snoop-Based Coherence
It has been shown that many requests miss in all remote nodes in shared memory multiprocessors. We are motivated by the observation that this behavior extends to much coarser grai...
Andreas Moshovos