Sciweavers

5506 search results - page 1100 / 1102
» Visualizing Software Changes
Sort
View
107
Voted
MOBISYS
2011
ACM
14 years 1 months ago
Odessa: enabling interactive perception applications on mobile devices
Resource constrained mobile devices need to leverage computation on nearby servers to run responsive applications that recognize objects, people, or gestures from real-time video....
Moo-Ryong Ra, Anmol Sheth, Lily B. Mummert, Padman...
105
Voted
SIGMOD
2011
ACM
220views Database» more  SIGMOD 2011»
14 years 1 months ago
Zephyr: live migration in shared nothing databases for elastic cloud platforms
Multitenant data infrastructures for large cloud platforms hosting hundreds of thousands of applications face the challenge of serving applications characterized by small data foo...
Aaron J. Elmore, Sudipto Das, Divyakant Agrawal, A...
WSDM
2012
ACM
325views Data Mining» more  WSDM 2012»
13 years 5 months ago
Correlating financial time series with micro-blogging activity
We study the problem of correlating micro-blogging activity with stock-market events, defined as changes in the price and traded volume of stocks. Specifically, we collect messa...
Eduardo J. Ruiz, Vagelis Hristidis, Carlos Castill...
107
Voted
ISCA
2012
IEEE
279views Hardware» more  ISCA 2012»
13 years 21 days ago
Staged memory scheduling: Achieving high performance and scalability in heterogeneous systems
When multiple processor (CPU) cores and a GPU integrated together on the same chip share the off-chip main memory, requests from the GPU can heavily interfere with requests from t...
Rachata Ausavarungnirun, Kevin Kai-Wei Chang, Lava...
72
Voted
GI
2007
Springer
15 years 4 months ago
VTANs - Eine Anwendung visueller Kryptographie in der Online-Sicherheit
: Wir beschreiben ein Verfahren, das die authentische Online-Übertragung von Transaktionen ermöglicht, ohne dass ein vertrauenswürdiger Zustand des Endgeräts (PC) vorausgesetzt...
Ulrich Greveler
« Prev « First page 1100 / 1102 Last » Next »