text stringlengths 29 3.76k | label stringclasses 8
values |
|---|---|
Scaling data storage is a significant concern in enterprise systems and
Storage Area Networks (SANs) are deployed as a means to scale enterprise
storage. SANs based on Fibre Channel have been used extensively in the last
decade while iSCSI is fast becoming a serious contender due to its reduced
costs and unified infras... | cs.* |
Network operators are facing significant challenges meeting the demand for
more bandwidth, agile infrastructures, innovative services, while keeping costs
low. Network Functions Virtualization (NFV) and Cloud Computing are emerging as
key trends of 5G network architectures, providing flexibility, fast
instantiation tim... | cs.* |
Minimizing the energy consumption of Linux-based devices is an essential step
towards their wide deployment in various IoT scenarios. Energy saving methods
such as duty-cycling aim to address this constraint by limiting the amount of
time the device is powered on. In this work we study and improve the amount of
time a ... | cs.* |
The task of similarity search in multimedia databases is usually accomplished
by range or k nearest neighbor queries. However, the expressing power of these
"single-example" queries fails when the user's delicate query intent is not
available as a single example. Recently, the well-known skyline operator was
reused in ... | cs.* |
We describe SAFIUS, a secure accountable file system that resides over an
untrusted storage. SAFIUS provides strong security guarantees like
confidentiality, integrity, prevention from rollback attacks, and
accountability. SAFIUS also enables read/write sharing of data and provides the
standard UNIX-like interface for ... | cs.* |
In this paper we investigate performance of global communications in a
particular parallel code. The code simulates dynamics of expansion of premixed
spherical flames using an asymptotic model of Sivashinsky type and a spectral
numerical algorithm. As a result, the code heavily relies on global all-to-all
interprocesso... | cs.* |
Molecular dynamics simulations, an indispensable research tool in
computational chemistry and materials science, consume a significant portion of
the supercomputing cycles around the world. We focus on multi-body potentials
and aim at achieving performance portability. Compared with well-studied pair
potentials, multib... | cs.* |
We retrieved and analyzed parallel storage workloads of the FUJITSU K5 cloud
service to clarify how to build cost-effective hybrid storage systems. A hybrid
storage system consists of fast but low-capacity tier (first tier) and slow but
high-capacity tier (second tier). And, it typically consists of either SSDs and
HDD... | cs.* |
Replication of scientific experiments is critical to the advance of science.
Unfortunately, the discipline of Computer Science has never treated replication
seriously, even though computers are very good at doing the same thing over and
over again. Not only are experiments rarely replicated, they are rarely even
replic... | cs.* |
The Gordon and Betty Moore Foundation ran an Investigator Competition as part
of its Data-Driven Discovery Initiative in 2014. We received about 1,100
applications and each applicant had the opportunity to list up to five
influential works in the general field of "Big Data" for scientific discovery.
We collected nearly... | cs.* |
Rankings are a fact of life. Whether or not one likes them, they exist and
are influential. Within academia, and in computer science in particular,
rankings not only capture our attention but also widely influence people who
have a limited understanding of computing science research, including
prospective students, uni... | cs.* |
This paper gives a systematic research review at the boundary of the
information systems (IS) and marketing disciplines. First, a historical
overview of these disciplines is given to put the review into context. This is
followed by a bibliographic analysis to select articles at the boundary of IS
and marketing. Text an... | cs.* |
On August 2, 2021 a group of concerned scientists and US funding agency and
federal government officials met for an informal discussion to explore the
value and need for a well-coordinated US Open Research Commons (ORC); an
interoperable collection of data and compute resources within both the public
and private sector... | cs.* |
Expansive, informative datasets are vital in providing foundations and
possibilities for scientific research and development across many fields of
study. Assembly of grand datasets, however, frequently poses difficulty for the
author and stakeholders alike, with a variety of considerations required
throughout the colla... | cs.* |
Consensus on the definition of data science remains low despite the
widespread establishment of academic programs in the field and continued demand
for data scientists in industry. Definitions range from rebranded statistics to
data-driven science to the science of data to simply the application of machine
learning to ... | cs.* |
The main goal of our work is to formally prove the correctness of the key
commands of the SCHUR software, an interactive program for calculating with
characters of Lie groups and symmetric functions. The core of the computations
relies on enumeration and manipulation of combinatorial structures. As a first
"proof of co... | cs.* |
The main computing tasks of a finite element code(FE) for solving partial
differential equations (PDE's) are the algebraic system assembly and the
iterative solver. This work focuses on the first task, in the context of a
hybrid MPI+X paradigm. Although we will describe algorithms in the FE context,
a similar strategy ... | cs.* |
Sparse tensor decomposition and completion are common in numerous
applications, ranging from machine learning to computational quantum chemistry.
Typically, the main bottleneck in optimization of these models are contractions
of a single large sparse tensor with a network of several dense matrices or
tensors (SpTTN). P... | cs.* |
Progress in High-Performance Computing in general, and High-Performance Graph
Processing in particular, is highly dependent on the availability of
publicly-accessible, relevant, and realistic data sets.
To ensure continuation of this progress, we (i) investigate and optimize the
process of generating large sequence s... | cs.* |
Low-level embedded systems are used to control cyber-phyiscal systems in
industrial and autonomous applications. They need to meet hard real-time
requirements as unanticipated controller delays on moving machines can have
devastating effects. Modern developments such as the industrial Internet of
Things and autonomous ... | cs.* |
Modern datacenter applications are prone to high tail latencies since their
requests typically follow highly-dispersive distributions. Delivering fast
interrupts is essential to reducing tail latency. Prior work has proposed both
OS- and system-level solutions to reduce tail latencies for microsecond-scale
workloads th... | cs.* |
Several solutions for specifying normative artefacts (norms, contracts,
policies) in a computational processable way have been presented in the
literature. Legal core ontologies have been proposed to systematize concepts
and relationships relevant to normative reasoning. However, no solution amongst
those has achieved ... | cs.* |
This paper reports on work aimed at supporting knowledge and expertise
finding within a large Research and Development (R&D) organisation. The paper
first discusses the nature of knowledge important to R&D organisations and
presents a prototype information system developed to support knowledge and
expertise finding. Th... | cs.* |
Hypersparse matrices are a powerful enabler for a variety of network, health,
finance, and social applications. Hierarchical hypersparse GraphBLAS matrices
enable rapid streaming updates while preserving algebraic analytic power and
convenience. In many contexts, the rate of these updates sets the bounds on
performance... | cs.* |
The Advancing Data Justice Research and Practice (ADJRP) project aims to
widen the lens of current thinking around data justice and to provide
actionable resources that will help policymakers, practitioners, and impacted
communities gain a broader understanding of what equitable, freedom-promoting,
and rights-sustainin... | cs.* |
Double-blind review relies on the authors' ability and willingness to
effectively anonymize their submissions. We explore anonymization effectiveness
at ASE 2016, OOPSLA 2016, and PLDI 2016 by asking reviewers if they can guess
author identities. We find that 74%-90% of reviews contain no correct guess and
that reviewe... | cs.* |
This volume represents the proceedings of the 5th Workshop on Membrane
Computing and Biologically Inspired Process Calculi (MeCBIC 2011), held
together with the 12th International Conference on Membrane Computing on 23rd
August 2011 in Fontainebleau, France. | cs.* |
Ising machines are specialized computers for finding the lowest energy states
of Ising spin models, onto which many practical combinatorial optimization
problems can be mapped. Simulated bifurcation (SB) is a quantum-inspired
parallelizable algorithm for Ising problems that enables scalable multi-chip
implementations o... | cs.* |
In this paper we present a graphical programming framework, LabVIEW, and
associated language and libraries, as well as programming techniques and
patterns that we have found useful in making FPGAs accessible to scientists and
engineers as domain expert software programmers. | cs.* |
As mathematical computing becomes more democratized in high-level languages,
high-performance symbolic-numeric systems are necessary for domain scientists
and engineers to get the best performance out of their machine without deep
knowledge of code optimization. Naturally, users need different term types
either to have... | cs.* |
In this paper, we revisit the design of synchronization
primitives---specifically barriers, mutexes, and semaphores---and how they
apply to the GPU. Previous implementations are insufficient due to the
discrepancies in hardware and programming model of the GPU and CPU. We create
new implementations in CUDA and analyze ... | cs.* |
As nuclear power expands, technical, economic, political, and environmental
analyses of nuclear fuel cycles by simulators increase in importance. To date,
however, current tools are often fleet-based rather than discrete and
restrictively licensed rather than open source. Each of these choices presents
a challenge to m... | cs.* |
In this work we present the Secure Machine, SeM for short, a CPU architecture
extension for secure computing. SeM uses a small amount of in-chip additional
hardware that monitors key communication channels inside the CPU chip, and only
acts when required. SeM provides confidentiality and integrity for a secure
program ... | cs.* |
The THedu'11 workshop received thirteen submissions, twelve of which were
accepted and presented during the workshop. For the post-conference proceedings
nine submission where received and accepted. The submissions are within the
scope of the following points, which have been announced in the call of papers:
CTP-based ... | cs.* |
The static analysis of cache accesses consists in correctly predicting which
accesses are hits or misses. While there exist good exact and approximate
analyses for caches implementing the least recently used (LRU) replacement
policy, such analyses were harder to find for other replacement policies. A
theoretical explan... | cs.* |
Physical processes are computations only when we use them to externalize
thought. Computation is the performance of one or more fixed processes within a
contingent environment. We reformulate the Church-Turing thesis so that it
applies to programs rather than to computability. When suitably formulated
agent-based compu... | cs.* |
New methods are being employed to meet the Navy's changing
software-development environment. | cs.* |
It has by now become a standard approach to use the theory of sparse (or
toric) elimination, based on the Newton polytope of a polynomial, in order to
reveal and exploit the structure of algebraic systems. This talk surveys
compact formulae, including older and recent results, in sparse elimination. We
start with root ... | cs.* |
This paper explores the role of operating system and high-level languages in
the development of software and domain-specific languages (DSLs) for
self-reconfigurable robotics. We review some of the current trends in
self-reconfigurable robotics and describe the development of a software system
for ATRON II which utiliz... | cs.* |
In the talk at the workshop my aim was to demonstrate the usefulness of graph
techniques for tackling problems that have been studied predominantly as
problems on the term level: increasing sharing in functional programs, and
addressing questions about Milner's process semantics for regular expressions.
For both situat... | cs.* |
In a variety of applications, we need to keep track of the development of a
data set over time. For maintaining and querying this multi version data
I/O-efficiently, external memory data structures are required. In this paper,
we present a probabilistic self-balancing persistent data structure in external
memory called... | cs.* |
Over nearly three decades at the University of Wisconsin, Jeff Naughton has
left an indelible mark on computer science. He has been a global leader of the
database research field, deepening its core and pushing its boundaries. Many of
Naughton's ideas were translated directly into practice in commercial and
open-source... | cs.* |
Monitoring often requires insight into the monitored system as well as
concrete specifications of expected behavior. More and more systems, however,
provide information about their inner procedures by emitting provenance
information in a W3C-standardized graph format.
In this work, we present an approach to monitor s... | cs.* |
Data Science is a complex and evolving field, but most agree that it can be
defined as a combination of expertise drawn from three broad areascomputer
science and technology, math and statistics, and domain knowledge -- with the
purpose of extracting knowledge and value from data. Beyond this, the field is
often define... | cs.* |
Efficient high-performance libraries often expose multiple tunable parameters
to provide highly optimized routines. These can range from simple loop unroll
factors or vector sizes all the way to algorithmic changes, given that some
implementations can be more suitable for certain devices by exploiting hardware
characte... | cs.* |
The first associations to software sustainability might be the existence of a
continuous integration (CI) framework; the existence of a testing framework
composed of unit tests, integration tests, and end-to-end tests; and also the
existence of software documentation. However, when asking what is a common
deathblow for... | cs.* |
We discuss some specific software engineering challenges in the field of
high-performance computing, and argue that the slow adoption of SE tools and
techniques is at least in part caused by the fact that these do not address the
HPC challenges `out-of-the-box'. By giving some examples of solutions for
designing, testi... | cs.* |
In the realm of sound object-oriented program analyses for information-flow
control, very few approaches adopt flow-sensitive abstractions of the heap that
enable a precise modeling of implicit flows. To tackle this challenge, we
advance a new symbolic abstraction approach for modeling the heap in Java-like
programs. W... | cs.* |
To reduce their environmental impact, cloud datacenters' are increasingly
focused on optimizing applications' carbon-efficiency, or work done per mass of
carbon emitted. To facilitate such optimizations, we present Carbon Containers,
a simple system-level facility, which extends prior work on power containers,
that aut... | cs.* |
Rickrolling is an Internet cultural phenomenon born in the mid 2000s.
Originally confined to Internet fora, it has spread to other channels and
media. In this paper, we hypothesize that rickrolling has reached the formal
academic world. We design and conduct a systematic experiment to survey
rickrolling in the academic... | cs.* |
Early in the pandemic, we -- leaders in the research areas of programming
languages (PL) and computer architecture (CA) -- realized that we had a
problem: the only way to form new lasting connections in the community was to
already have lasting connections in the community. Both of our academic
communities had wonderfu... | cs.* |
Nowadays, the use of embedded operating systems in different embedded
projects is subject to a tremendous growth. Embedded Linux is becoming one of
those most popular EOSs due to its modularity, efficiency, reliability, and
cost. One way to make it hard real-time is to include a real-time kernel like
Xenomai. One of th... | cs.* |
Modern DRAM architectures allow a number of low-power states on individual
memory ranks for advanced power management. Many previous studies have taken
advantage of demotions on low-power states for energy saving. However, most of
the demotion schemes are statically performed on a limited number of
pre-selected low-pow... | cs.* |
Non-volatile memory (NVM) technologies, being accessible in the same manner
as DRAM, are considered indispensable for expanding main memory capacities.
Intel Optane DCPMM is a long-awaited product that drastically increases main
memory capacities. However, a substantial performance gap exists between DRAM
and DCPMM. In... | cs.* |
Large pages are commonly deployed to reduce address translation overheads for
big-memory workloads. Modern x86-64 processors from Intel and AMD support two
large page sizes -- 1GB and 2MB. However, previous works on large pages have
primarily focused on 2MB pages, partly due to lack of substantial evidence on
the profi... | cs.* |
Poor time predictability of multicore processors has been a long-standing
challenge in the real-time systems community. In this paper, we make a case
that a fundamental problem that prevents efficient and predictable real-time
computing on multicore is the lack of a proper memory abstraction to express
memory criticali... | cs.* |
Multi-socket machines with 1-100 TBs of physical memory are becoming
prevalent. Applications running on multi-socket machines suffer non-uniform
bandwidth and latency when accessing physical memory. Decades of research have
focused on data allocation and placement policies in NUMA settings, but there
have been no studi... | cs.* |
We can use a hybrid memory system consisting of DRAM and Intel Optane DC
Persistent Memory (We call it DCPM in this paper) as DCPM is now commercially
available since April 2019. Even if the latency for DCPM is several times
higher than that for DRAM, the capacity for DCPM is several times higher than
that for DRAM and... | cs.* |
Recently, the amount of running software on smart mobile devices is gradually
increasing due to the introduction of application stores. The application store
is a type of digital distribution platform for application software, which is
provided as a component of an operating system on a smartphone or tablet.
Mobile dev... | cs.* |
The emerging CXL.mem standard provides a new type of byte-addressable remote
memory with a variety of memory types and hierarchies. With CXL.mem, multiple
layers of memory -- e.g., local DRAM and CXL-attached remote memory at
different locations -- are exposed to operating systems and user applications,
bringing new ch... | cs.* |
Motivated by the massive energy usage of blockchain, on the one hand, and by
significant performance improvements in low-power, wimpy systems, on the other
hand, we perform an in-depth time-energy analysis of blockchain systems on
low-power nodes in comparison to high-performance nodes. We use three low-power
systems t... | cs.* |
In this paper, we propose TAPA, an end-to-end framework that compiles a C++
task-parallel dataflow program into a high-frequency FPGA accelerator. Compared
to existing solutions, TAPA has two major advantages. First, TAPA provides a
set of convenient APIs that allow users to easily express flexible and complex
inter-ta... | cs.* |
Algorithms for laying out large graphs have seen significant progress in the
past decade. However, browsing large graphs remains a challenge. Rendering
thousands of graphical elements at once often results in a cluttered image, and
navigating these elements naively can cause disorientation. To address this
challenge we... | cs.* |
This document describes strategies for using Artificial Intelligence (AI) to
predict some journal article scores in future research assessment exercises.
Five strategies have been assessed. | cs.* |
Emergence (macro-level effects from micro-level causes) is at the heart of
the conflict between reductionism and functionalism. How can there be
autonomous higher level laws of nature (the functionalist claim) if everything
can be reduced to the fundamental forces of physics (the reductionist
position)? We cut through ... | cs.* |
Organizations across all sectors are increasingly undergoing deep
transformation and restructuring towards data-driven operations. The central
role of data highlights the need for reliable and clean data. Unreliable,
erroneous, and incomplete data lead to critical bottlenecks in processing
pipelines and, ultimately, se... | cs.* |
Graph transformation is the rule-based modification of graphs, and is a
discipline dating back to the 1970s. The declarative nature of graph rewriting
rules comes at a cost. In general, to match the left-hand graph of a fixed rule
within a host graph requires polynomial time. To improve matching performance,
D\"orr pro... | cs.* |
This volume contains a selection of papers presented at Linearity/TLLA 2018:
Joint Linearity and TLLA workshops (part of FLOC 2018) held on July 7-8, 2018
in Oxford. Linearity has been a key feature in several lines of research in
both theoretical and practical approaches to computer science. On the
theoretical side th... | cs.* |
Finite-state tree automata are a well studied formalism for representing term
languages. This paper studies the problem of determining the regularity of the
set of instances of a finite set of terms with variables, where each variable
is restricted to instantiations of a regular set given by a tree automaton. The
probl... | cs.* |
Main memory (DRAM) significantly impacts the power and energy utilization of
the overall server system. Non-Volatile Memory (NVM) devices, such as Phase
Change Memory and Spin-Transfer Torque RAM, are suitable candidates for main
memory to reduce energy consumption. But unlike DRAM, NVMs access latencies are
higher tha... | cs.* |
Byte-addressable non-volatile memory (NVM) sitting on the memory bus is
employed to make persistent memory (PMem) in general-purpose computing systems
and embedded systems for data storage. Researchers develop software drivers
such as the block translation table (BTT) to build block devices on PMem, so
programmers can ... | cs.* |
Each researcher should have a full shelf---physical or virtual---of books on
writing and editing prose. Though we make no claim to any special degree of
expertise, we recently edited a book of complexity theory surveys (Complexity
Theory Retrospective II, Springer-Verlag, 1997), and in doing so we were
brought into par... | cs.* |
In this article, we shall describe some of the most interesting topics in the
subject of Complexity Science for a general audience. Anyone with a solid
foundation in high school mathematics (with some calculus) and an elementary
understanding of computer programming will be able to follow this article.
First, we shall ... | cs.* |
We consider the problem of computing the Euler characteristic of an abstract
simplicial complex given by its vertices and facets. We show that this problem
is #P-complete and present two new practical algorithms for computing Euler
characteristic. The two new algorithms are derived using combinatorial
commutative algeb... | cs.* |
Read-Copy Update (RCU) is a scalable, high-performance Linux-kernel
synchronization mechanism that runs low-overhead readers concurrently with
updaters. Production-quality RCU implementations for multi-core systems are
decidedly non-trivial. Giving the ubiquity of Linux, a rare "million-year" bug
can occur several time... | cs.* |
Multi-agent reinforcement learning (MARL) has emerged as a useful approach to
solving decentralised decision-making problems at scale. Research in the field
has been growing steadily with many breakthrough algorithms proposed in recent
years. In this work, we take a closer look at this rapid development with a
focus on... | cs.* |
The music industry has huge troubles adapting to the new technologies. As
many pointed out, when copying music is essentially free and socially accepted
it becomes increasingly tempting for users to infringe copyrights and copy
music from one person to another. The answer of the music industry is to outlaw
a majority o... | cs.* |
Generalized sparse matrix-matrix multiplication is a key primitive for many
high performance graph algorithms as well as some linear solvers such as
multigrid. We present the first parallel algorithms that achieve increasing
speedups for an unbounded number of processors. Our algorithms are based on
two-dimensional blo... | cs.* |
Generalized sparse matrix-matrix multiplication (or SpGEMM) is a key
primitive for many high performance graph algorithms as well as for some linear
solvers, such as algebraic multigrid. Here we show that SpGEMM also yields
efficient algorithms for general sparse-matrix indexing in distributed memory,
provided that the... | cs.* |
Sparse matrix-vector multiplication (spMVM) is the dominant operation in many
sparse solvers. We investigate performance properties of spMVM with matrices of
various sparsity patterns on the nVidia "Fermi" class of GPGPUs. A new "padded
jagged diagonals storage" (pJDS) format is proposed which may substantially
reduce ... | cs.* |
Asymmetric multicore processors (AMPs) have recently emerged as an appealing
technology for severely energy-constrained environments, especially in mobile
appliances where heterogeneity in applications is mainstream. In addition,
given the growing interest for low-power high performance computing, this type
of architec... | cs.* |
Algebraic multigrid (AMG) is often viewed as a scalable $\mathcal{O}(n)$
solver for sparse linear systems. Yet, parallel AMG lacks scalability due to
increasingly large costs associated with communication, both in the initial
construction of a multigrid hierarchy as well as the iterative solve phase.
This work introduc... | cs.* |
In this paper we demonstrate the methodology for parallelizing the
computation of large one-dimensional discrete fast Fourier transforms (DFFTs)
on multi-core Intel Xeon processors. DFFTs based on the recursive Cooley-Tukey
method have to control cache utilization, memory bandwidth and vector hardware
usage, and at the... | cs.* |
News outlets are developing formats dedicated to social platforms that
capture audience attention, such as Instagram stories, Facebook Instant
articles, and YouTube videos. In some cases, these formats are created in
collaboration with the tech companies themselves. At the same time, the use of
data-driven storytelling... | cs.* |
First responders and other forward deployed essential workers can benefit
from advanced analytics. Limited network access and software security
requirements prevent the usage of standard cloud based microservice analytic
platforms that are typically used in industry. One solution is to precompute a
wide range of analyt... | cs.* |
This paper presents Telebrain, a browser-based performatization platform
invented for organizing real-time telematic performances. Performatization is
the human performance of algorithms. When computers and humans performatize
cooperatively, the human-computer interaction (HCI) becomes the location of
computation. Nove... | cs.* |
This work introduces efficient symbolic algorithms for quantitative reactive
synthesis. We consider resource-constrained robotic manipulators that need to
interact with a human to achieve a complex task expressed in linear temporal
logic. Our framework generates reactive strategies that not only guarantee task
completi... | cs.* |
Attention-based Neural Networks (NN) have demonstrated their effectiveness in
accurate memory access prediction, an essential step in data prefetching.
However, the substantial computational overheads associated with these models
result in high inference latency, limiting their feasibility as practical
prefetchers. To ... | cs.* |
In this paper, we present our ongoing work and initial results on the formal
specification and verification of MiniMaple (a substantial subset of Maple with
slight extensions) programs. The main goal of our work is to find behavioral
errors in such programs w.r.t. their specifications by static analysis. This
task is m... | cs.* |
Irregular applications comprise an increasingly important workload domain for
many fields, including bioinformatics, chemistry, physics, social sciences and
machine learning. Therefore, achieving high performance and energy efficiency
in the execution of emerging irregular applications is of vital importance.
This diss... | cs.* |
The general translator formalism and computing specific implementations are
proposed. The implementation of specific elements necessary to process the
source and destination information within the translators are presented. Some
common directives or instructions, such as classes and procedures, were unified
and general... | cs.* |
The development of cost-effective highperformance parallel computing on
multi-processor supercomputers makes it attractive to port excessively time
consuming simulation software from personal computers (PC) to super computes.
The power distribution system simulator (PDSS) takes a bottom-up approach and
simulates load a... | cs.* |
Computer-supported learning is an increasingly important form of study since
it allows for independent learning and individualized instruction. In this
paper, we discuss a novel approach to developing an intelligent tutoring system
for teaching textbook-style mathematical proofs. We characterize the
particularities of ... | cs.* |
Automated Deduction in Geometry (ADG) is a forum to exchange ideas and views,
to present research results and progress, and to demonstrate software tools at
the intersection between geometry and automated deduction. Relevant topics
include (but are not limited to): polynomial algebra, invariant and
coordinate-free meth... | cs.* |
We advocate a domain specific software development methodology for
heterogeneous computing platforms such as Multicore CPUs, GPUs and FPGAs. We
argue that three specific benefits are realised from adopting such an approach:
portable, efficient implementations across heterogeneous platforms; domain
specific metrics of q... | cs.* |
In 1960s V.Geodakian proposed a theory that explains sexes as a mechanism for
evolutionary adaptation of the species to changing environmental conditions. In
2001 V.Iskrin refined and augmented the concepts of Geodakian and gave a new
and interesting explanation to several phenomena which involve sex, and sex
ratio, in... | cs.* |
More and more researchers have realized that ontologies will play a critical
role in the development of the Semantic Web, the next generation Web in which
content is not only consumable by humans, but also by software agents. The
development of tools to support ontology management including creation,
visualization, ann... | cs.* |
Despite its scientific, political, and practical value, comprehensive
information about human languages, in all their variety and complexity, is not
readily obtainable and searchable. One reason is that many language data are
collected as audio and video recordings which imposes a challenge to document
indexing and ret... | cs.* |
Can we do arithmetic in a completely different way, with a radically
different data structure? Could this approach provide practical benefits, like
operations on giant numbers while having an average performance similar to
traditional bitstring representations?
While answering these questions positively, our tree bas... | cs.* |
This volume contains selected papers presented at the 9th International
Workshop on Reduction Strategies in Rewriting and Programming, WRS2009, which
was held in Brasilia on the 28th June 2009, associated to RTA 2009 (the 20th
International Conference on Rewriting Techniques and Applications) at RDP, the
Federated Conf... | cs.* |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.