Sciweavers

13841 search results - page 2565 / 2769
» Algorithms and Constraint Programming
Sort
View
139
Voted
IEEEPACT
2008
IEEE
15 years 10 months ago
Exploiting loop-dependent stream reuse for stream processors
The memory access limits the performance of stream processors. By exploiting the reuse of data held in the Stream Register File (SRF), an on-chip storage, the number of memory acc...
Xuejun Yang, Ying Zhang, Jingling Xue, Ian Rogers,...
99
Voted
PIMRC
2008
IEEE
15 years 10 months ago
Multiuser MIMO two-way relaying for cellular communications
Abstract— Two-way relaying, which enables bidirectional simultaneous data transmission between two nodes, is an efficient means to reduce the spectral efficiency loss observed ...
Celal Esli, Armin Wittneben
148
Voted
SCAM
2008
IEEE
15 years 10 months ago
Rejuvenate Pointcut: A Tool for Pointcut Expression Recovery in Evolving Aspect-Oriented Software
Aspect-Oriented Programming (AOP) strives to localize the scattered and tangled implementations of crosscutting concerns (CCCs) by allowing developers to declare that certain acti...
Raffi Khatchadourian, Awais Rashid
103
Voted
SP
2008
IEEE
100views Security Privacy» more  SP 2008»
15 years 10 months ago
Towards Practical Privacy for Genomic Computation
Many basic tasks in computational biology involve operations on individual DNA and protein sequences. These sequences, even when anonymized, are vulnerable to re-identification a...
Somesh Jha, Louis Kruger, Vitaly Shmatikov
WIMOB
2008
IEEE
15 years 10 months ago
Rate Allocation with Lifetime Maximization and Fairness for Data Aggregation in Sensor Networks
—We consider the rate allocation problem for data aggregation in wireless sensor networks with two objectives: 1) maximizing the lifetime of a local aggregation cluster and, 2) a...
Shouwen Lai, Binoy Ravindran, Hyeonjoong Cho
« Prev « First page 2565 / 2769 Last » Next »