Sciweavers

992 search results - page 142 / 199
» Dependencies to Optimize Ontology Based Data Access
Sort
View
111
Voted
DATE
2010
IEEE
180views Hardware» more  DATE 2010»
15 years 6 months ago
A reconfigurable cache memory with heterogeneous banks
Abstract— The optimal size of a large on-chip cache can be different for different programs: at some point, the reduction of cache misses achieved when increasing cache size hits...
Domingo Benitez, Juan C. Moure, Dolores Rexachs, E...
FSTTCS
2000
Springer
15 years 5 months ago
Text Sparsification via Local Maxima
In this paper we investigate some properties and algorithms related to a text sparsification technique based on the identification of local maxima in the given string. As the numb...
Pierluigi Crescenzi, Alberto Del Lungo, Roberto Gr...
IACR
2011
94views more  IACR 2011»
14 years 1 months ago
Secure Computation with Sublinear Amortized Work
Traditional approaches to secure computation begin by representing the function f being computed as a circuit. For any function f that depends on each of its inputs, this implies ...
S. Dov Gordon, Jonathan Katz, Vladimir Kolesnikov,...
SIGMOD
2008
ACM
123views Database» more  SIGMOD 2008»
16 years 1 months ago
Query-based partitioning of documents and indexes for information lifecycle management
Regulations require businesses to archive many electronic documents for extended periods of time. Given the sheer volume of documents and the response time requirements, documents...
Soumyadeb Mitra, Marianne Winslett, Windsor W. Hsu
INFOCOM
2009
IEEE
15 years 8 months ago
Wi-Sh: A Simple, Robust Credit Based Wi-Fi Community Network
— Wireless community networks, where users share wireless bandwidth is attracting tremendous interest from academia and industry. Companies such as FON have been successful in at...
Xin Ai, Vikram Srinivasan, Chen-Khong Tham