Sciweavers

790 search results - page 109 / 158
» Recommender systems for the conference paper assignment prob...
Sort
View
MICRO
2005
IEEE
126views Hardware» more  MICRO 2005»
15 years 3 months ago
Cost Sensitive Modulo Scheduling in a Loop Accelerator Synthesis System
Scheduling algorithms used in compilers traditionally focus on goals such as reducing schedule length and register pressure or producing compact code. In the context of a hardware...
Kevin Fan, Manjunath Kudlur, Hyunchul Park, Scott ...
P2P
2003
IEEE
110views Communications» more  P2P 2003»
15 years 3 months ago
The Effectiveness of Realistic Replication Strategies on Quality of Availability for Peer-to-Peer Systems
In this paper, we take an availability-centric view on quality of service (QoS) and propose a model and mechanisms for studying the effectiveness of realistic replication schemes ...
Giwon On, Jens Schmitt, Ralf Steinmetz
POPL
2012
ACM
13 years 5 months ago
A language for automatically enforcing privacy policies
It is becoming increasingly important for applications to protect sensitive data. With current techniques, the programmer bears the burden of ensuring that the application’s beh...
Jean Yang, Kuat Yessenov, Armando Solar-Lezama
VLDB
2002
ACM
120views Database» more  VLDB 2002»
14 years 9 months ago
Improving Data Access of J2EE Applications by Exploiting Asynchronous Messaging and Caching Services
The J2EE platform provides a variety of options for making business data persistent using DBMS technology. However, the integration with existing backend database systems has prov...
Samuel Kounev, Alejandro P. Buchmann
HICSS
2003
IEEE
102views Biometrics» more  HICSS 2003»
15 years 3 months ago
Economics of Technology Standards: Implications for Offline Movie Piracy in a Global Context
Reduced sizes of music files due to compression technologies has allowed for piracy to become a rampant problem on the Internet even in the absence of significant bandwidth. Howev...
Ramnath K. Chellappa, Shivendu Shivendu