Sciweavers

5344 search results - page 879 / 1069
» Privacy-Preserving Set Operations
Sort
View
136
Voted
IISWC
2006
IEEE
15 years 9 months ago
Performance Characterization of SPEC CPU2006 Integer Benchmarks on x86-64 Architecture
— As x86-64 processors become the CPU of choice for the personal computer market, it becomes increasingly important to understand the performance we can expect by migrating appli...
Dong Ye, Joydeep Ray, Christophe Harle, David R. K...
125
Voted
ISCA
2006
IEEE
125views Hardware» more  ISCA 2006»
15 years 9 months ago
Architectural Semantics for Practical Transactional Memory
Transactional Memory (TM) simplifies parallel programming by allowing for parallel execution of atomic tasks. Thus far, TM systems have focused on implementing transactional stat...
Austen McDonald, JaeWoong Chung, Brian D. Carlstro...
108
Voted
VTC
2006
IEEE
15 years 9 months ago
An Iterative Detection Technique for DS-CDMA Signals with Strong Nonlinear Distortion Effects
Abstract - Whenever a DS-CDMA signal (Direct Sequence Code Division Multiple Access) is the sum of several components associated to different spreading codes (e.g., the DS-CDMA sig...
Rui Dinis, Paulo Silva
143
Voted
HICSS
2005
IEEE
95views Biometrics» more  HICSS 2005»
15 years 9 months ago
Understanding the Effect of Risk Aversion on Risk
As we progress, society must intelligently address the following question: How much risk is acceptable? How we answer this question could have important consequences for the futur...
U. S. Bhatt, David E. Newman, Benjamin A. Carreras...
132
Voted
IDEAS
2005
IEEE
149views Database» more  IDEAS 2005»
15 years 9 months ago
An Adaptive Multi-Objective Scheduling Selection Framework for Continuous Query Processing
Adaptive operator scheduling algorithms for continuous query processing are usually designed to serve a single performance objective, such as minimizing memory usage or maximizing...
Timothy M. Sutherland, Yali Zhu, Luping Ding, Elke...