Sciweavers

1855 search results - page 163 / 371
» A coding theorem for distributed computation
Sort
View
131
Voted
CW
2004
IEEE
15 years 7 months ago
Barcode Readers using the Camera Device in Mobile Phones
This paper shows new algorithms and the implementations of image reorganization for EAN/QR barcodes in mobile phones. The mobile phone system used here consists of a camera, mobil...
Eisaku Ohbuchi, Hiroshi Hanaizumi, Lim Ah Hock
124
Voted
ICS
2000
Tsinghua U.
15 years 7 months ago
Synthesizing transformations for locality enhancement of imperfectly-nested loop nests
We present an approach for synthesizing transformations to enhance locality in imperfectly-nested loops. The key idea is to embed the iteration space of every statement in a loop ...
Nawaaz Ahmed, Nikolay Mateev, Keshav Pingali
153
Voted
HPCA
2012
IEEE
13 years 11 months ago
Pacman: Tolerating asymmetric data races with unintrusive hardware
Data races are a major contributor to parallel software unreliability. A type of race that is both common and typically harmful is the Asymmetric data race. It occurs when at leas...
Shanxiang Qi, Norimasa Otsuki, Lois Orosa Nogueira...
ACCV
2009
Springer
15 years 10 months ago
Natural Image Segmentation with Adaptive Texture and Boundary Encoding
We present a novel algorithm for unsupervised segmentation of natural images that harnesses the principle of minimum description length (MDL). Our method is based on observations ...
Shankar Rao, Hossein Mobahi, Allen Y. Yang, Shanka...
171
Voted
NDSS
2003
IEEE
15 years 8 months ago
Access Control Based on Execution History
Security is a major, frequent concern in extensible software systems such as Java Virtual Machines and the Common Language Runtime. These systems aim to enable simple, classic app...
Martín Abadi, Cédric Fournet