Sciweavers

1192 search results - page 33 / 239
» Computing Weakest Readings
Sort
View
DNIS
2007
Springer
114views Database» more  DNIS 2007»
15 years 6 months ago
Improving the Performance of Read-Only Transactions Through Speculation
A read-only transaction (ROT) does not modify any data. The main issues regarding processing ROTs are correctness, data currency and performance. Two-phase Locking (2PL) protocol i...
Thirumalaisamy Ragunathan, P. Krishna Reddy
ICDAR
2003
IEEE
15 years 5 months ago
Towards Automatic Video-based Whiteboard Reading
As whiteboards have become a popular tool in meeting rooms, there has been a growing interest in making use of the whiteboard as a user interface for human computer interaction. T...
Markus Wienecke, Gernot A. Fink, Gerhard Sagerer
SIGDOC
2006
ACM
15 years 5 months ago
Why don't people read the manual?
Few users of computer applications seek help from the documentation. This paper reports the results of an empirical study of why this is so and examines how, in real work, users s...
David G. Novick, Karen Ward
GPC
2010
Springer
15 years 4 months ago
SLA-Driven Automatic Bottleneck Detection and Resolution for Read Intensive Multi-tier Applications Hosted on a Cloud
Abstract. A Service-Level Agreement (SLA) provides surety for specific quality attributes to the consumers of services. However, the current SLAs offered by cloud providers do no...
Waheed Iqbal, Matthew N. Dailey, David Carrera, Pa...
FCCM
2004
IEEE
141views VLSI» more  FCCM 2004»
15 years 3 months ago
Deep Packet Filter with Dedicated Logic and Read Only Memories
Searching for multiple string patterns in a stream of data is a computationally expensive task. The speed of the search pattern module determines the overall performance of deep p...
Young H. Cho, William H. Mangione-Smith