Login
 
Me Minimize

        
My Friends Minimize
        
 
Welcome Minimize
This website has been updated last time in 2012.

To see an up-to-date version of my profile, please visit my Linkedin page at:
Linkedin Profile

To see and up-to-date list of my publications, please visit my Google Scholar page at:
Google Scholar Page
        
Latest Updates Minimize
We won the best student paper award! - Wednesday, October 19, 2011

More photos...
Our paper entitled "COCA Filters: Co-Occurrence Aware Bloom filters" won the best student paper award in the 18th International Symposium on String Processing and Information Retrieval in Pisa, Italy. This paper is a joint work with Kamran Tirdad, Ian Munro and Alejandro López-Ortiz.
 

Data processing using GPUs - Wednesday, December 1, 2010
I have created a webpage including many useful resources about utilizing the computational power of GPUs in database and information retrieval.
I will keep updating this webpage regularly with relevant articles, links, training and informative videos. 
I hope this webpage will serve as a useful resource for those who are new to GPGPU and are willing to know more about its applications in data processing.
You can access this webpage from here.
 

My "Flash Gallery" is now up! - Friday, January 1, 2010

Take a look at some of my selected implementations with Flash in my new Flash Gallery.

Enjoy Phrase Counter, my latest flash-based gadget which counts the number of the occurences of the english phrases in different sites, as simple as clicking a button.

 

    Print      
Random articles from Techcrunch Minimize
Let’s talk about kill switches, lock-in, and how vendors can fall down a rabbit hole of customer abuse and destroy themselves using a strategy like John Deere’s. We’ll close with the product of the week, a cool microphone from an HP subsidiary, HyperX. The post John Deere, Russian Thieves, and the Double-Edged Sword of Vendor Lock-In appeared first on TechNewsWorld.
Read more...

When designing or architecting a solution to ensure responsible data use, it is important to develop a universal data authorization framework that includes these six key capabilities. The post 6 Critical Steps for Scaling Secure Universal Data Authorization appeared first on TechNewsWorld.
Read more...

teenage boy reading tablet
Online videos have cemented their place at the top of young people’s media hierarchies. However, video gaming did not increase dramatically during the pandemic. The top activities remain the same — online videos, gaming, and social media. The post Kids’ Screen Use Sees Fastest Rise in 4 Years appeared first on TechNewsWorld.
Read more...

Called Tusk, the new browser is the brainchild of Jeff Bermant, a Santa Barbara, Calif. real estate developer and founder of the Cocoon VPN. He said he built Tusk because he felt that free speech for conservatives was being censored by the current browsers in the market. The post Free-Speech, Uncensored Browser Launched for Conservatives appeared first on TechNewsWorld.
Read more...

123
    Print      
Happy New Year
Happy New Year
Me

Copyright 2008 by Pedram Ghodsnia