Sciweavers

14306 search results - page 2541 / 2862
» Database System Concepts
Sort
View
149
Voted
ISCA
2008
IEEE
143views Hardware» more  ISCA 2008»
15 years 5 months ago
TokenTM: Efficient Execution of Large Transactions with Hardware Transactional Memory
Current hardware transactional memory systems seek to simplify parallel programming, but assume that large transactions are rare, so it is acceptable to penalize their performance...
Jayaram Bobba, Neelam Goyal, Mark D. Hill, Michael...
124
Voted
COMPSEC
2007
52views more  COMPSEC 2007»
15 years 5 months ago
Privacy-preserving programming using sython
— Programmers often have access to confidential data that are not strictly needed for program development. Broad priveleges from accounts given to programmers allow them to view...
Michael Gaiman, Rahul Simha, Bhagirath Narahari
IVS
2008
79views more  IVS 2008»
15 years 5 months ago
Scalable and interactive visual analysis of financial wire transactions for fraud detection
Large financial institutions such as Bank of America handle hundreds of thousands of wire transactions per day. Although most transactions are legitimate, these institutions have ...
Remco Chang, Alvin Lee, Mohammad Ghoniem, Robert K...
JAIR
2008
118views more  JAIR 2008»
15 years 5 months ago
On the Use of Automatically Acquired Examples for All-Nouns Word Sense Disambiguation
This article focuses on Word Sense Disambiguation (WSD), which is a Natural Language Processing task that is thought to be important for many Language Technology applications, suc...
David Martínez, Oier Lopez de Lacalle, Enek...
JUCS
2008
155views more  JUCS 2008»
15 years 5 months ago
Combining Classifiers in the ROC-space for Off-line Signature Verification
: In this work we present a strategy for off-line signature verification. It takes into account a writer-independent model which reduces the pattern recognition problem to a 2-clas...
Luiz S. Oliveira, Edson J. R. Justino, Robert Sabo...
« Prev « First page 2541 / 2862 Last » Next »