Sciweavers

5344 search results - page 892 / 1069
» Privacy-Preserving Set Operations
Sort
View
122
Voted
NAACL
2003
15 years 5 months ago
Automatic Acquisition of Names Using Speak and Spell Mode in Spoken Dialogue Systems
This paper describes a novel multi-stage recognition procedure for deducing the spelling and pronunciation of an open set of names. The overall goal is the automatic acquisition o...
Grace Chung, Stephanie Seneff, Chao Wang
SOSP
1997
ACM
15 years 4 months ago
Towards Transparent and Efficient Software Distributed Shared Memory
Despite a large research effort, software distributed shared memory systems have not been widely used to run parallel applications across clusters of computers. The higher perform...
Daniel J. Scales, Kourosh Gharachorloo
121
Voted
WSC
1997
15 years 4 months ago
AutoSched Tutorial
The AutoSchedTM finite capacity planning and scheduling tool helps you increase throughput, reduce in-process inventory, and increase equipment and personnel utilization. AutoSche...
Bill Lindler
USENIX
1996
15 years 4 months ago
AFRAID - A Frequently Redundant Array of Independent Disks
Disk arrays are commonly designed to ensure that stored data will always be able to withstand a disk failure, but meeting this goal comes at a significant cost in performance. We ...
Stefan Savage, John Wilkes
122
Voted
AAAI
1990
15 years 4 months ago
The Design of a Marker Passing Architecture for Knowledge Processing
Knowledge processing is very demanding on computer architectures. Knowledge processing generates subcomputation paths at an exponential rate. It is memory intensive and has high c...
Wing Lee, Dan I. Moldovan