Sciweavers

1628 search results - page 208 / 326
» Compiler Construction Using Scheme
Sort
View
AIED
2007
Springer
15 years 11 months ago
Assessing Learning in a Peer-Driven Tutoring System
In many intelligent tutoring systems, a detailed model of the task domain is constructed and used to provide students with assistance and direction. Reciprocal tutoring systems, h...
Ari Bader-Natal, Jordan B. Pollack
VLDB
2005
ACM
162views Database» more  VLDB 2005»
15 years 10 months ago
XQuery Implementation in a Relational Database System
Many enterprise applications prefer to store XML data as a rich data type, i.e. a sequence of bytes, in a relational database system to avoid the complexity of decomposing the dat...
Shankar Pal, Istvan Cseri, Oliver Seeliger, Michae...
HPCA
2007
IEEE
16 years 5 months ago
Improving Branch Prediction and Predicated Execution in Out-of-Order Processors
If-conversion is a compiler technique that reduces the misprediction penalties caused by hard-to-predict branches, transforming control dependencies into data dependencies. Althou...
Eduardo Quiñones, Joan-Manuel Parcerisa, An...
ESA
2005
Springer
107views Algorithms» more  ESA 2005»
15 years 10 months ago
Workload-Optimal Histograms on Streams
Histograms are used in many ways in conventional databases and in data stream processing for summarizing massive data distributions. Previous work on constructing histograms on da...
S. Muthukrishnan, Martin Strauss, X. Zheng
143
Voted
ASIACRYPT
2004
Springer
15 years 10 months ago
Secret Handshakes from CA-Oblivious Encryption
Secret handshakes were recently introduced [BDS+ 03] to allow members of the same group to authenticate each other secretly, in the sense that someone who is not a group member ca...
Claude Castelluccia, Stanislaw Jarecki, Gene Tsudi...