Sciweavers

5964 search results - page 1104 / 1193
» A theory of speculative computation
Sort
View
100
Voted
EGH
2010
Springer
14 years 10 months ago
Texture compression of light maps using smooth profile functions
Light maps have long been a popular technique for visually rich real-time rendering in games. They typically contain smooth color gradients which current low bit rate texture comp...
Jim Rasmusson, Jacob Ström, Per Wennersten, M...
ICTAC
2010
Springer
14 years 10 months ago
Mechanized Verification with Sharing
We consider software verification of imperative programs by theorem proving in higher-order separation logic. Of particular interest are the difficulties of encoding and reasoning ...
J. Gregory Malecha, Greg Morrisett
MOBIHOC
2010
ACM
14 years 10 months ago
On quality of monitoring for multi-channel wireless infrastructure networks
Passive monitoring utilizing distributed wireless sniffers is an effective technique to monitor activities in wireless infrastructure networks for fault diagnosis, resource manage...
Arun Chhetri, Huy Anh Nguyen, Gabriel Scalosub, Ro...
ANCS
2009
ACM
14 years 10 months ago
Design and performance analysis of a DRAM-based statistics counter array architecture
The problem of maintaining efficiently a large number (say millions) of statistics counters that need to be updated at very high speeds (e.g. 40 Gb/s) has received considerable re...
Haiquan (Chuck) Zhao, Hao Wang, Bill Lin, Jun (Jim...
136
Voted
GI
2009
Springer
14 years 10 months ago
Source Conflicts in Bayesian Identification
: In Bayesian identification an ID source is in conflict with the other ID sources, if both provide substantially different, reliable information on a tracked object. After discuss...
Max Krüger, David Hirschhäuser
« Prev « First page 1104 / 1193 Last » Next »