In 2017, the Software Engineering Institute (SEI) Architecture Technology User Network (SATURN) Conference celebrated its 13th year. As the premier software architecture conference for senior engineers, SATURN 2017 offered keynotes and sessions on both essential skills and cutting-edge methods for software architects. Agile Architecture and Design, Pradyumn Sharma A Hands-on Introduction to Docker
Economics Of Privacy This page provides links to resources on the economics of privacy, financial privacy, and the economics of anonymity: papers, people, related conferences, and other links. Behind a privacy intrusion there is often an economic trade-off. The reduction of the cost of storing and manipulating information has led organizations to capture increasing amounts of data about individual
SuRF: Practical Range Query Filtering with Fast Succinct Tries Huanchen Zhang Carnegie Mellon University huanche1@cs.cmu.edu Hyeontaek Lim Carnegie Mellon University hl@cs.cmu.edu Viktor Leis TU München leis@in.tum.de David G. Andersen Carnegie Mellon University dga@cs.cmu.edu Michael Kaminsky Intel Labs michael.e.kaminsky@intel.com Kimberly Keeton Hewlett Packard Enterprise kimberly.keeton@hpe.co
Building a Bw-Tree Takes More Than Just Buzz Words Ziqi Wang Carnegie Mellon University ziqiw@cs.cmu.edu Andrew Pavlo Carnegie Mellon University pavlo@cs.cmu.edu Hyeontaek Lim Carnegie Mellon University hl@cs.cmu.edu Viktor Leis TU München leis@in.tum.de Huanchen Zhang Carnegie Mellon University huanche1@cs.cmu.edu Michael Kaminsky Intel Labs michael.e.kaminsky@intel.com David G. Andersen Carnegie
In-Memory Databases S. Harizopoulos, et al., OLTP Through the Looking Glass, and What We Found There, in SIGMOD, 2008 H. Garcia-Molina, et al., Main Memory Database Systems: An Overview, in IEEE Trans. on Knowl. and Data Eng., 1992 (Optional) D.J. DeWitt, et al., Implementation Techniques for Main Memory Database Systems, in SIGMOD, 1984 (Optional) Query Compilation T. Neumann, Efficiently Compili
Master of Science in Product Management Launch your product management career in one focused year Perhaps you dream of delivering innovative, affordable healthcare to the underserved or creating more efficient transportation systems for a sustainable future. Maybe your mission is to build an app to promote accessible education or create an immersive entertainment experience. Whatever problem you a
30 CO M PUTE R P U B L I S H E D B Y T H E I E E E CO M P U T E R S O C I E T Y� 0 0 1 8 - 9 1 6 2 / 1 7/ $ 3 3 . 0 0 © 2 0 1 7 I E E E COVER FEATURE OUTLOOK The Emergence of Edge Computing Mahadev Satyanarayanan, Carnegie Mellon University Industry investment and research interest in edge computing, in which computing and storage nodes are placed at the Internet’s edge in close proximity to mobil
What is picoCTF? picoCTF is a free, online cybersecurity competition for middle and high school students. During a two-week competition period, participants learn and apply cybersecurity skills to reverse engineer, break, hack, decrypt or do whatever it takes to solve a series of challenges centered around a unique storyline. Similar to a game of "capture the flag" (hence the "CTF" in picoCTF), te
Account disable announcementAs of Friday, September 8, 2023, the SEI Secure Coding Wiki no longer provides the ability to sign up for new user accounts. In addition, all accounts that have not made contributions (e.g., comments, edits) to a space or page content will be disabled (accounts that have had recent activity will not be disabled). If you have a specific need to keep your account active,
Security Blanket by Lorrie Faith Cranor, machine quilted, digitally printed cotton fabric, 63.5" x 39", appeared in the February 7, 2014 issue of Science Magazine. Passwords ties, fabric, and other fashion and furnishings now available! Passwords and Authentication Research To combat both the inherent and user-induced weaknesses of text-based passwords, administrators and organizations typically i
Optimization for Deep Networks Ishan Misra Overview • Vanilla SGD • SGD + Momentum • NAG • Rprop • AdaGrad • RMSProp • AdaDelta • Adam More tricks • Batch Normalization • Natural Networks Gradient (Steepest) Descent • Move in the opposite direction of the gradient Conjugate Gradient Methods • See Moller 1993 [A scaled conjugate gradient algorithm for fast supervised learning], Martens et al., 2010
リリース、障害情報などのサービスのお知らせ
最新の人気エントリーの配信
処理を実行中です
j次のブックマーク
k前のブックマーク
lあとで読む
eコメント一覧を開く
oページを開く