Sciweavers

155 search results - page 2 / 31
» Flexible Aliasing with Protection
Sort
View
SAC
2008
ACM
13 years 4 months ago
Flexible pointer analysis using assign-fetch graphs
se a new abstraction for pointer analysis that represents reads and writes to memory instead of traditional points-to relations. Compared to points-to graphs, our Assign-Fetch Gra...
Marcio Buss, Daniel Brand, Vugranam C. Sreedhar, S...
ICIP
2004
IEEE
14 years 7 months ago
Spatial scalability and compression efficiency within a flexible motion compensated 3D-DWT
We investigate the implications of the conventional "t+2D" MC 3D-DWT structure for spatial scalability, and propose a more exible "2D+t+2D" structure. An initi...
Nagita Mehrseresht, David Taubman
DATE
2004
IEEE
139views Hardware» more  DATE 2004»
13 years 9 months ago
Flexible Software Protection Using Hardware/Software Codesign Techniques
A strong level of trust in the software running on an embedded processor is a prerequisite for its widespread deployment in any high-risk system. The expanding field of software p...
Joseph Zambreno, Alok N. Choudhary, Rahul Simha, B...
VLDB
2002
ACM
122views Database» more  VLDB 2002»
13 years 4 months ago
Lightweight Flexible Isolation for Language-based Extensible Systems
Safe programming languages encourage the development of dynamically extensible systems, such as extensible Web servers and mobile agent platforms. Although protection is of utmost...
Laurent Daynès, Grzegorz Czajkowski
ICMCS
2008
IEEE
194views Multimedia» more  ICMCS 2008»
13 years 11 months ago
Sparse FEC codes for flexible media protection
In this paper, we study block codes that are optimized to recover some lost source data even in case when full recovery is not possible. Conventionally, block codes designed for p...
Jari Korhonen, Pascal Frossard