Sciweavers

1999 search results - page 348 / 400
» Finding Reductions Automatically
Sort
View
ISCA
2012
IEEE
302views Hardware» more  ISCA 2012»
13 years 2 months ago
Scale-out processors
The emergence of global-scale online services has galvanized scale-out software, characterized by splitting vast datasets and massive computation across many independent servers. ...
Pejman Lotfi-Kamran, Boris Grot, Michael Ferdman, ...
ICDE
2006
IEEE
149views Database» more  ICDE 2006»
16 years 1 months ago
How to Determine a Good Multi-Programming Level for External Scheduling
Scheduling/prioritization of DBMS transactions is important for many applications that rely on database backends. A convenient way to achieve scheduling is to limit the number of ...
Bianca Schroeder, Mor Harchol-Balter, Arun Iyengar...
ICPR
2004
IEEE
16 years 26 days ago
Text Detection from Natural Scene Images: Towards a System for Visually Impaired Persons
We propose a system that reads the text encountered in natural scenes with the aim to provide assistance to the visually impaired persons. This paper describes the system design a...
Nobuo Ezaki, Marius Bulacu, Lambert Schomaker
GIS
2009
ACM
16 years 25 days ago
A Case Study of Using Geographic Cues to Predict Query News Intent
Geographic information retrieval encompasses important tasks including finding the location of a user, and locations relevant to their search queries. Web-based search engines rec...
Ahmed Hassan, Rosie Jones, Fernando Diaz
SIGSOFT
2007
ACM
16 years 15 days ago
SLEDE: lightweight verification of sensor network security protocol implementations
Finding flaws in security protocol implementations is hard. Finding flaws in the implementations of sensor network security protocols is even harder because they are designed to p...
Youssef Hanna