Sciweavers

39 search results - page 6 / 8
» Analysis of Virtual Method Invocation for Binary Translation
Sort
View
CORR
2010
Springer
155views Education» more  CORR 2010»
15 years 2 months ago
A Proof Theoretic Analysis of Intruder Theories
We consider the problem of intruder deduction in security protocol analysis: that is, deciding whether a given message M can be deduced from a set of messages under the theory of ...
Alwen Tiu, Rajeev Goré, Jeremy E. Dawson
ICCV
1995
IEEE
15 years 8 months ago
In Defence of the 8-Point Algorithm
The fundamental matrix is a basic tool in the analysis of scenes taken with two uncalibrated cameras, and the 8-point algorithm is a frequently cited method for computing the fund...
Richard I. Hartley
CVPR
1999
IEEE
16 years 7 months ago
Panoramic EPI Generation and Analysis of Video from a Moving Platform with Vibration
This paper presents a novel approach for generating and analyzing epipolar plane images (EPIs) from video sequences taken from a moving platform subject to vibration so that the 3...
Zhigang Zhu, Guangyou Xu, Xueyin Lin
CGO
2004
IEEE
15 years 9 months ago
Software-Controlled Operand-Gating
Operand gating is a technique for improving processor energy efficiency by gating off sections of the data path that are unneeded by short-precision (narrow) operands. A method fo...
Ramon Canal, Antonio González, James E. Smi...
SAS
2007
Springer
108views Formal Methods» more  SAS 2007»
15 years 11 months ago
Programming Language Design and Analysis Motivated by Hardware Evolution
Abstract. Silicon chip design has passed a threshold whereby exponentially increasing transistor density (Moore’s Law) no longer translates into increased processing power for si...
Alan Mycroft