Sciweavers

2746 search results - page 391 / 550
» Application performance on the Direct Access File System
Sort
View
ISCA
1994
IEEE
117views Hardware» more  ISCA 1994»
15 years 8 months ago
Evaluating Stream Buffers as a Secondary Cache Replacement
Today's commodity microprocessors require a low latency memory system to achieve high sustained performance. The conventional high-performance memory system provides fast dat...
Subbarao Palacharla, Richard E. Kessler
SIGMOD
2004
ACM
131views Database» more  SIGMOD 2004»
16 years 4 months ago
Order-Preserving Encryption for Numeric Data
Encryption is a well established technology for protecting sensitive data. However, once encrypted, data can no longer be easily queried aside from exact matches. We present an or...
Rakesh Agrawal, Jerry Kiernan, Ramakrishnan Srikan...
WWW
2010
ACM
15 years 11 months ago
TWC data-gov corpus: incrementally generating linked government data from data.gov
The Open Government Directive is making US government data available via websites such as Data.gov for public access. In this paper, we present a Semantic Web based approach that ...
Li Ding, Dominic DiFranzo, Alvaro Graves, James Mi...
SP
2009
IEEE
15 years 10 months ago
Privacy Weaknesses in Biometric Sketches
The increasing use of biometrics has given rise to new privacy concerns. Biometric encryption systems have been proposed in order to alleviate such concerns: rather than comparing...
Koen Simoens, Pim Tuyls, Bart Preneel
IAT
2008
IEEE
15 years 10 months ago
Evolving Logic Programming Based Agents with Temporal Operators
Logic Programming Update Languages were proposed as an extension of logic programming, which allow for modelling the dynamics of knowledge bases where both extensional knowledge (...
José Júlio Alferes, Alfredo Gabaldon...