Sciweavers

5550 search results - page 1080 / 1110
» Different Approaches to Proof Systems
Sort
View
PODS
2008
ACM
165views Database» more  PODS 2008»
16 years 2 months ago
Data exchange and schema mappings in open and closed worlds
In the study of data exchange one usually assumes an openworld semantics, making it possible to extend instances of target schemas. An alternative closed-world semantics only move...
Leonid Libkin, Cristina Sirangelo
WSDM
2010
ACM
315views Data Mining» more  WSDM 2010»
15 years 11 months ago
SBotMiner: Large Scale Search Bot Detection
In this paper, we study search bot traffic from search engine query logs at a large scale. Although bots that generate search traffic aggressively can be easily detected, a large ...
Fang Yu, Yinglian Xie, Qifa Ke
CGO
2010
IEEE
15 years 8 months ago
Integrated instruction selection and register allocation for compact code generation exploiting freeform mixing of 16- and 32-bi
For memory constrained embedded systems code size is at least as important as performance. One way of increasing code density is to exploit compact instruction formats, e.g. ARM T...
Tobias J. K. Edler von Koch, Igor Böhm, Bj&ou...
ASPLOS
2010
ACM
15 years 8 months ago
Analyzing multicore dumps to facilitate concurrency bug reproduction
Debugging concurrent programs is difficult. This is primarily because the inherent non-determinism that arises because of scheduler interleavings makes it hard to easily reproduc...
Dasarath Weeratunge, Xiangyu Zhang, Suresh Jaganna...
TEI
2010
ACM
179views Hardware» more  TEI 2010»
15 years 8 months ago
Feeling the beat where it counts: fostering multi-limb rhythm skills with the haptic drum kit
This paper introduces a tool known as the Haptic Drum Kit, which employs four computer-controlled vibrotactile devices, one attached to each wrist and ankle. In the applications d...
Simon Holland, Anders J. Bouwer, Mathew Dalgelish,...
« Prev « First page 1080 / 1110 Last » Next »