Sciweavers

1236 search results - page 174 / 248
» fast 2010
Sort
View
IWMM
2010
Springer
125views Hardware» more  IWMM 2010»
15 years 6 months ago
Efficient memory shadowing for 64-bit architectures
Shadow memory is used by dynamic program analysis tools to store metadata for tracking properties of application memory. The efficiency of mapping between application memory and s...
Qin Zhao, Derek Bruening, Saman P. Amarasinghe
NLDB
2010
Springer
15 years 6 months ago
Semantic Enriching of Natural Language Texts with Automatic Thematic Role Annotation
Abstract. This paper proposes an approach which utilizes natural language processing (NLP) and ontology knowledge to automatically denote the implicit semantics of textual requirem...
Sven J. Körner, Mathias Landhäußer
AAAI
2010
15 years 5 months ago
Security Games with Arbitrary Schedules: A Branch and Price Approach
Security games, and important class of Stackelberg games, are used in deployed decision-support tools in use by LAX police and the Federal Air Marshals Service. The algorithms use...
Manish Jain, Erim Kardes, Christopher Kiekintveld,...
AVI
2010
15 years 5 months ago
3D attentional maps: aggregated gaze visualizations in three-dimensional virtual environments
Gaze visualizations hold the potential to facilitate usability studies of interactive systems. However, visual gaze analysis in threedimensional virtual environments still lacks m...
Sophie Stellmach, Lennart Nacke, Raimund Dachselt
NSDI
2010
15 years 5 months ago
Prophecy: Using History for High-Throughput Fault Tolerance
Byzantine fault-tolerant (BFT) replication has enjoyed a series of performance improvements, but remains costly due to its replicated work. We eliminate this cost for read-mostly ...
Siddhartha Sen, Wyatt Lloyd, Michael J. Freedman