Sciweavers

7742 search results - page 1415 / 1549
» The Robustness of Level Sets
Sort
View
CHI
2006
ACM
16 years 1 months ago
Being watched or being special: how I learned to stop worrying and love being monitored, surveilled, and assessed
This paper explores the relationship between display of feedback (public vs. private) by a computer system and the basis for evaluation (present vs. absent) of that feedback. We e...
Erica Robles, Abhay Sukumaran, Kathryn Rickertsen,...
103
Voted
HPCA
2006
IEEE
16 years 1 months ago
Store vectors for scalable memory dependence prediction and scheduling
Allowing loads to issue out-of-order with respect to earlier unresolved store addresses is very important for extracting parallelism in large-window superscalar processors. Blindl...
Samantika Subramaniam, Gabriel H. Loh
HPCA
2003
IEEE
16 years 1 months ago
Dynamic Optimization of Micro-Operations
Inherent within complex instruction set architectures such as x86 are inefficiencies that do not exist in a simpler ISAs. Modern x86 implementations decode instructions into one o...
Brian Slechta, David Crowe, Brian Fahs, Michael Fe...
222
Voted
POPL
2006
ACM
16 years 1 months ago
Decidability and proof systems for language-based noninterference relations
Noninterference is the basic semantical condition used to account for confidentiality and integrity-related properties in programming languages. There appears to be an at least im...
Mads Dam
RECOMB
2006
Springer
16 years 1 months ago
Genome-Wide Discovery of Modulators of Transcriptional Interactions in Human B Lymphocytes
Abstract. Transcriptional interactions in a cell are modulated by a variety of mechanisms that prevent their representation as pure pairwise interactions between a transcription fa...
Kai Wang, Ilya Nemenman, Nilanjana Banerjee, Adam ...
« Prev « First page 1415 / 1549 Last » Next »