Sciweavers

39 search results - page 6 / 8
» Analysis of Virtual Method Invocation for Binary Translation
Sort
View
CORR
2010
Springer
155views Education» more  CORR 2010»
14 years 6 months ago
A Proof Theoretic Analysis of Intruder Theories
We consider the problem of intruder deduction in security protocol analysis: that is, deciding whether a given message M can be deduced from a set of messages under the theory of ...
Alwen Tiu, Rajeev Goré, Jeremy E. Dawson
ICCV
1995
IEEE
15 years 1 months ago
In Defence of the 8-Point Algorithm
The fundamental matrix is a basic tool in the analysis of scenes taken with two uncalibrated cameras, and the 8-point algorithm is a frequently cited method for computing the fund...
Richard I. Hartley
CVPR
1999
IEEE
15 years 11 months ago
Panoramic EPI Generation and Analysis of Video from a Moving Platform with Vibration
This paper presents a novel approach for generating and analyzing epipolar plane images (EPIs) from video sequences taken from a moving platform subject to vibration so that the 3...
Zhigang Zhu, Guangyou Xu, Xueyin Lin
66
Voted
CGO
2004
IEEE
15 years 1 months ago
Software-Controlled Operand-Gating
Operand gating is a technique for improving processor energy efficiency by gating off sections of the data path that are unneeded by short-precision (narrow) operands. A method fo...
Ramon Canal, Antonio González, James E. Smi...
SAS
2007
Springer
108views Formal Methods» more  SAS 2007»
15 years 3 months ago
Programming Language Design and Analysis Motivated by Hardware Evolution
Abstract. Silicon chip design has passed a threshold whereby exponentially increasing transistor density (Moore’s Law) no longer translates into increased processing power for si...
Alan Mycroft