Sciweavers

18090 search results - page 3578 / 3618
» Computing by Only Observing
Sort
View
152
Voted
TOPLAS
2008
138views more  TOPLAS 2008»
15 years 3 months ago
Decomposing bytecode verification by abstract interpretation
act Interpretation C. BERNARDESCHI, N. DE FRANCESCO, G. LETTIERI, L. MARTINI, and P. MASCI Universit`a di Pisa Bytecode verification is a key point in the security chain of the Jav...
Cinzia Bernardeschi, Nicoletta De Francesco, Giuse...
TPDS
2008
175views more  TPDS 2008»
15 years 3 months ago
Centralized versus Distributed Schedulers for Bag-of-Tasks Applications
Multiple applications that execute concurrently on heterogeneous platforms compete for CPU and network resources. In this paper, we consider the problem of scheduling applications ...
Olivier Beaumont, Larry Carter, Jeanne Ferrante, A...
131
Voted
TSC
2008
112views more  TSC 2008»
15 years 3 months ago
A Privacy Preserving Repository for Data Integration across Data Sharing Services
Current data sharing and integration among various organizations require a central and trusted authority to collect data from all data sources and then integrate the collected data...
Stephen S. Yau, Yin Yin
125
Voted
JMIV
2007
143views more  JMIV 2007»
15 years 3 months ago
Measures for Benchmarking of Automatic Correspondence Algorithms
Automatic localisation of correspondences for the construction of Statistical Shape Models from examples has been the focus of intense research during the last decade. Several alg...
Anders Ericsson, Johan Karlsson
120
Voted
TSP
2008
94views more  TSP 2008»
15 years 3 months ago
Cross-Entropy-Based Sign-Selection Algorithms for Peak-to-Average Power Ratio Reduction of OFDM Systems
Sign-selection uses a set of subcarrier signs to reduce the peak-to-average power ratio (PAR) of orthogonal-frequency-division multiplexing (OFDM). However, the computational compl...
Luqing Wang, Chintha Tellambura
« Prev « First page 3578 / 3618 Last » Next »