Sciweavers

6004 search results - page 913 / 1201
» Parallelizing query optimization
Sort
View
PLDI
1996
ACM
15 years 7 months ago
A Reduced Multipipeline Machine Description that Preserves Scheduling Constraints
High performance compilers increasingly rely on accurate modeling of the machine resources to efficiently exploit the instruction level parallelism of an application. In this pape...
Alexandre E. Eichenberger, Edward S. Davidson
136
Voted
ATAL
2006
Springer
15 years 6 months ago
ActorNet: an actor platform for wireless sensor networks
We present actorNet, a mobile agent platform for wireless sensor networks (WSNs). WSNs are well-suited to multiagent systems: agent autonomy reduces the need for communication, sa...
YoungMin Kwon, Sameer Sundresh, Kirill Mechitov, G...
118
Voted
CAV
2010
Springer
206views Hardware» more  CAV 2010»
15 years 6 months ago
Dynamic Cutoff Detection in Parameterized Concurrent Programs
We consider the class of finite-state programs executed by an unbounded number of replicated threads communicating via shared variables. The thread-state reachability problem for t...
Alexander Kaiser, Daniel Kroening, Thomas Wahl
114
Voted
CIKM
2008
Springer
15 years 4 months ago
A metric cache for similarity search
Similarity search in metric spaces is a general paradigm that can be used in several application fields. It can also be effectively exploited in content-based image retrieval syst...
Fabrizio Falchi, Claudio Lucchese, Salvatore Orlan...
119
Voted
CRYPTO
2008
Springer
100views Cryptology» more  CRYPTO 2008»
15 years 4 months ago
Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms
Abstract. This paper discusses key recovery and universal forgery attacks on several MAC algorithms based on universal hash functions. The attacks use a substantial number of verif...
Helena Handschuh, Bart Preneel