Sciweavers

4397 search results - page 499 / 880
» Relational Algebra Operations
Sort
View
151
Voted
PLPV
2010
ACM
16 years 1 months ago
Arity-generic datatype-generic programming
Some programs are doubly-generic. For example, map is datatypegeneric in that many different data structures support a mapping operation. A generic programming language like Gener...
Stephanie Weirich, Chris Casinghino
ICDE
2010
IEEE
238views Database» more  ICDE 2010»
15 years 12 months ago
Correlation hiding by independence masking
— Extracting useful correlation from a dataset has been extensively studied. In this paper, we deal with the opposite, namely, a problem we call correlation hiding (CH), which is...
Yufei Tao, Jian Pei, Jiexing Li, Xiaokui Xiao, Ke ...
ASPLOS
2010
ACM
15 years 11 months ago
Specifying and dynamically verifying address translation-aware memory consistency
Computer systems with virtual memory are susceptible to design bugs and runtime faults in their address translation (AT) systems. Detecting bugs and faults requires a clear speciļ...
Bogdan F. Romanescu, Alvin R. Lebeck, Daniel J. So...
CLUSTER
2009
IEEE
15 years 11 months ago
Topics on measuring real power usage on high performance computing platforms
—Power has recently been recognized as one of the major obstacles in fielding a Peta-FLOPs class system. To reach Exa-FLOPs, the challenge will certainly be compounded. In this ...
James H. Laros, Kevin T. Pedretti, Suzanne M. Kell...
CSE
2009
IEEE
15 years 11 months ago
A Framework for Enforcing Constrained RBAC Policies
—Constraints are an important part of role-based access control policies. The safety or security of a system is maintained by enforcing constraints that are specified in the pol...
Jason Crampton, Hemanth Khambhammettu