Sciweavers

SIGIR
2002
ACM
14 years 10 months ago
Using part-of-speech patterns to reduce query ambiguity
Query ambiguity is a generally recognized problem, particularly in Web environments where queries are commonly only one or two words in length. In this study, we explore one techn...
James Allan, Hema Raghavan
80
Voted
SIGCSE
2002
ACM
114views Education» more  SIGCSE 2002»
14 years 10 months ago
Gender and information technology: implications of definitions
In this paper, we examine implications of definitions of information technology to women's participation in the industry and in academe. This paper is exploratory only, based...
Wendy L. Cukier, Denise Shortt, Irene Devine
83
Voted
TC
1998
14 years 10 months ago
Analysis of Checkpointing Schemes with Task Duplication
—This paper suggests a technique for analyzing the performance of checkpointing schemes with task duplication. We show how this technique can be used to derive the average execut...
Avi Ziv, Jehoshua Bruck
87
Voted
TC
1998
14 years 10 months ago
Using Decision Diagrams to Design ULMs for FPGAs
—Many modern Field Programmable Logic Arrays (FPGAs) use lookup table (LUT) logic blocks which can be programmed to realize any function of a fixed number of inputs. It is possib...
Zeljko Zilic, Zvonko G. Vranesic
74
Voted
TC
1998
14 years 10 months ago
Solving Boolean Equations Using ROSOP Forms
Yuke Wang, Carl McCrosky
TC
1998
14 years 10 months ago
The InfoPad Multimedia Terminal: A Portable Device for Wireless Information Access
—The architecture of a device that is optimized for wireless information access and display of multimedia data is substantially different than configurations designed for portabl...
Thomas E. Truman, Trevor Pering, Roger Doering, Ro...
96
Voted
TC
1998
14 years 10 months ago
Optimizing the Instruction Cache Performance of the Operating System
—High instruction cache hit rates are key to high performance. One known technique to improve the hit rate of caches is to minimize cache interference by improving the layout of ...
Josep Torrellas, Chun Xia, Russell L. Daigle
104
Voted
TC
1998
14 years 10 months ago
Resilient Authentication Using Path Independence
—Authentication using a path of trusted intermediaries, each able to authenticate the next in the path, is a well-known technique for authenticating channels in a large distribut...
Michael K. Reiter, Stuart G. Stubblebine
91
Voted
TC
1998
14 years 10 months ago
Design Verification of the S3.mp Cache-Coherent Shared-Memory System
—This paper describes the methods used to formulate and validate the memory subsystem of the cache-coherent Sun Scalable emory MultiProcessor (S3.mp) at three levels of abstracti...
Fong Pong, Michael C. Browne, Gunes Aybay, Andreas...
92
Voted
TC
1998
14 years 10 months ago
Comments on Duprat and Muller's Branching CORDIC Paper
In [1], Duprat and Muller introduced the ingenious “Branching CORDIC” algorithm. It enables a fast implementation of CORDIC algorithm using signed digits and requires a consta...
Dhananjay S. Phatak