Search
Now showing items 291-300 of 547
2-Level Page Tables (2-LPT): A Building Block for Efficient Address Translation in Virtualized Environments
Efficient address translation mechanisms are gaining more and more attention as the virtual
address range of the processors keeps expanding and the demand for machine virtualization
increases with cloud and data center-based ...
Analysis and Methods for Knowledge Graph Embeddings
Knowledge Graphs (KGs) are multi-relational graphs where nodes represent entities, and typed edges represent relationships among entities. These graphs store real-world facts such as (Lionel Messi, plays-for-team, Barcelona) ...
Automated Test Generation and Performance Improvement using Dynamic Program Analysis
Software development process consists of various stages like design, implementation, and
testing. Since programmers are considerably involved in these stages, their intuition and
expertise play a vital role in the success ...
Checking Observational Purity of Procedures
We provide two static analysis approaches(using theorem proving) that check if a given (recursive)
procedure behaves as if it were stateless, even when it maintains state in global variables.
In other words, we check if ...
nuKSM: NUMA-aware Memory De-duplication for Multi-socket Servers
An operating system's memory management has multiple goals, e.g. reducing memory access latencies, reducing memory footprint. These goals can conflict with each other when independent subsystems optimize them in silos. ...
A Novel Neural Network Architecture for Sentiment-oriented Aspect-Opinion Pair Extraction
Over the years, fine-grained opinion mining in online reviews has received great attention from the
NLP research community. It involves different tasks such as Aspect Term Extraction (ATE), Opinion Term Extraction (OTE), ...
Scaling Blockchains Using Coding Theory and Verifiable Computing
The issue of scalability has been restricting blockchain from its widespread adoption. The
current transaction rate of bitcoin is around seven transactions/second while its size has crossed
the 300 GB mark. Although many ...
A Framework for Privacy-Compliant Delivery Drones
We present Privaros, a framework to enforce privacy policies on drones. Privaros is designed for commercial delivery drones, such as the ones that will likely be used by Amazon Prime Air. Such drones visit a number of host ...
Statistical Network Analysis: Community Structure, Fairness Constraints, and Emergent Behavior
Networks or graphs provide mathematical tools for describing and analyzing relational data. They are used in biology to model interactions between proteins, in economics to identify trade alliances among countries, in ...
Stochastic approximation with set-valued maps and Markov noise: Theoretical foundations and applications
Stochastic approximation algorithms produce estimates of a desired solution using noisy real world data.
Introduced by Robbins and Monro, in 1951, stochastic approximation techniques have been instrumental in
the asymptotic ...

