Sciweavers

8468 search results - page 1340 / 1694
» The Technology of Data Stashing
Sort
View
CHI
2005
ACM
15 years 12 months ago
From creating virtual gestures to "writing" in sign languages
Sign languages have been proven to be natural languages, as capable of expressing human thoughts and emotions as traditional languages are. The distinct visual and spatial nature ...
Beifang Yi, Frederick C. Harris Jr., Sergiu M. Das...
92
Voted
VLSID
2002
IEEE
122views VLSI» more  VLSID 2002»
15 years 11 months ago
Evaluating Run-Time Techniques for Leakage Power Reduction
While some leakage power reduction techniques require modification of process technology achieving savings at the fabrication stage, others are based on circuit-level optimization...
David Duarte, Yuh-Fang Tsai, Narayanan Vijaykrishn...
92
Voted
OSDI
2002
ACM
15 years 11 months ago
TCP Nice: A Mechanism for Background Transfers
Many distributed applications can make use of large background transfers ? transfers of data that humans are not waiting for ? to improve availability, reliability, latency or con...
Arun Venkataramani, Ravi Kokku, Michael Dahlin
174
Voted
VLDB
2004
ACM
152views Database» more  VLDB 2004»
15 years 11 months ago
The BEA streaming XQuery processor
Abstract This paper describes the design, implementation, and performance characteristics of a commercial XQuery processing engine, the BEA streaming XQuery processor. This XQuery ...
Daniela Florescu, Chris Hillery, Donald Kossmann, ...
VLDB
2006
ACM
172views Database» more  VLDB 2006»
15 years 11 months ago
Hierarchical hippocratic databases with minimal disclosure for virtual organizations
Abstract The protection of customer privacy is a fundamental issue in today's corporate marketing strategies. Not surprisingly, many research efforts have proposed new privacy...
Fabio Massacci, John Mylopoulos, Nicola Zannone
« Prev « First page 1340 / 1694 Last » Next »