Sciweavers

2067 search results - page 383 / 414
» Modeling and exploiting query interactions in database syste...
Sort
View
126
Voted
JSAC
2006
106views more  JSAC 2006»
15 years 3 months ago
Study of BGP Peering Session Attacks and Their Impacts on Routing Performance
We present a detailed study of the potential impact of BGP peering session attacks and the resulting exploitation of Route Flap Damping (RFD) that cause network-wide routing disrup...
Kotikalapudi Sriram, Doug Montgomery, Oliver Borch...
ICS
2011
Tsinghua U.
14 years 7 months ago
Predictive coordination of multiple on-chip resources for chip multiprocessors
Efficient on-chip resource management is crucial for Chip Multiprocessors (CMP) to achieve high resource utilization and enforce system-level performance objectives. Existing mul...
Jian Chen, Lizy Kurian John
131
Voted
HRI
2006
ACM
15 years 10 months ago
Using context and sensory data to learn first and second person pronouns
We present a method of grounded word learning that is powerful enough to learn the meanings of first and second person pronouns. The model uses the understood words in an utteran...
Kevin Gold, Brian Scassellati
VVG
2003
205views Computer Vision» more  VVG 2003»
15 years 5 months ago
Digitisation to Presentation -  Building Virtual Museum Exhibitions
We describe an innovative system designed for museums to create, manage and present multimedia based representations of museum artefacts in virtual exhibitions both inside and out...
Manjula Patel, Martin White, Krzysztof Walczak, Pa...
CIDR
2009
167views Algorithms» more  CIDR 2009»
15 years 5 months ago
Unbundling Transaction Services in the Cloud
The traditional architecture for a DBMS engine has the recovery, concurrency control and access method code tightly bound together in a storage engine for records. We propose a di...
David B. Lomet, Alan Fekete, Gerhard Weikum, Micha...