Sciweavers

DAMON
2013
Springer
11 years 12 months ago
Energy-proportional query execution using a cluster of wimpy nodes
Because energy use of single-server systems is far from being energy proportional, we explore whether or not better energy efficiency may be achieved by a cluster of nodes whose s...
Daniel Schall, Theo Härder
DAC
2013
ACM
11 years 12 months ago
Mapping on multi/many-core systems: survey of current and emerging trends
The reliance on multi/many-core systems to satisfy the high performance requirement of complex embedded software applications is increasing. This necessitates the need to realize ...
Amit Kumar Singh, Muhammad Shafique, Akash Kumar, ...
CVPR
2013
IEEE
11 years 12 months ago
3D-Based Reasoning with Blocks, Support, and Stability
3D volumetric reasoning is important for truly understanding a scene. Humans are able to both segment each object in an image, and perceive a rich 3D interpretation of the scene, ...
Zhaoyin Jia, Andrew C. Gallagher, Ashutosh Saxena,...
CUBIST
2013
43views more  CUBIST 2013»
11 years 12 months ago
Formal Concept Analysis as a Framework for Business Intelligence Technologies II
Formal concept analysis (FCA) with measures can be seen as a framework for Business Intelligence technologies. In this paper we introduce new ideas about an OLAP cube. We take a fo...
Juraj Macko
CSP
2013
31views more  CSP 2013»
11 years 12 months ago
DNA Tiles, Wang Tiles and Combinators
In this paper we explore the relation between Wang Tiles and Schonfinkel Combinators in order to investigate Functional Combinators as an programming language for Self-assembly an...
Marco Bellia, M. Eugenia Occhiuto
CSMR
2013
IEEE
11 years 12 months ago
Understanding Widespread Changes: A Taxonomic Study
Abstract—Many active research studies in software engineering, such as detection of recurring bug fixes, detection of copyand-paste bugs, and automated program transformation to...
Shaowei Wang, David Lo, Lingxiao Jiang
CSFW
2013
IEEE
11 years 12 months ago
A Theory of Information-Flow Labels
Abstract—The security literature offers a multitude of calculi, languages, and systems for information-flow control, each with some set of labels encoding security policies that...
Benoît Montagu, Benjamin C. Pierce, Randy Pol...
CSDM
2013
36views more  CSDM 2013»
11 years 12 months ago
Reinventing Goal-Based Requirements Modeling
Understanding user needs, requirements, architecture specifications, and design specifications for a system holds up-most importance in a systems engineering project. The early p...
Vikas Shukla, Guillaume Auriol
CRYPTO
2013
Springer
101views Cryptology» more  CRYPTO 2013»
11 years 12 months ago
Practical Bootstrapping in Quasilinear Time
Jacob Alperin-Sheriff, Chris Peikert
CONEXT
2013
ACM
11 years 12 months ago
Crowd-assisted search for price discrimination in e-commerce: first results
After years of speculation, price discrimination in ecommerce driven by the personal information that users leave (involuntarily) online, has started attracting the attention of p...
Jakub Mikians, László Gyarmati, Vijay Er...