Sciweavers

24188 search results - page 4750 / 4838
» Computing on Encrypted Data
Sort
View
POPL
1998
ACM
15 years 7 months ago
Putting Pointer Analysis to Work
This paper addresses the problem of how to apply pointer analysis to a wide variety of compiler applications. We are not presenting a new pointer analysis. Rather, we focus on put...
Rakesh Ghiya, Laurie J. Hendren
POPL
1998
ACM
15 years 7 months ago
From System F to Typed Assembly Language
abstractions, such as closures, tuples, and user-defined abstract data types. The type system ensures that well-typed programs cannot violate these abstractions. In addition, the ...
J. Gregory Morrisett, David Walker, Karl Crary, Ne...
SIGCOMM
1998
ACM
15 years 7 months ago
The MASC/BGMP Architecture for Inter-Domain Multicast Routing
Multicast routing enables e cient data distribution to multiple recipients. However, existing work has concentrated on extending single-domain techniques to wide-area networks, ra...
Satish Kumar, Pavlin Radoslavov, David Thaler, Cen...
134
Voted
COMPSAC
1997
IEEE
15 years 7 months ago
Classifying Architectural Elements as a Foundation for Mechanism Matching
Building a system at the architectural level can be thought of as decomposition into components followed by a series of exercises in matching. Components must be composed with eac...
Rick Kazman, Paul C. Clements, Leonard J. Bass, Gr...
MICCAI
1998
Springer
15 years 7 months ago
Motion Measurements in Low-Contrast X-ray Imagery
Measuring motion in medical imagery becomes more and more important, in particular for object tracking, image registration, and local displacement measurements. Often, the require...
Martin Berger, Guido Gerig
« Prev « First page 4750 / 4838 Last » Next »