Sciweavers

1513 search results - page 231 / 303
» Cryptographic Pattern Matching
Sort
View
SIGMOD
2007
ACM
196views Database» more  SIGMOD 2007»
16 years 2 months ago
Adaptive location constraint processing
An important problem for many location-based applications is the continuous evaluation of proximity relations among moving objects. These relations express whether a given set of ...
Zhengdao Xu, Hans-Arno Jacobsen
ISSTA
2009
ACM
15 years 8 months ago
Identifying semantic differences in AspectJ programs
Program differencing is a common means of software debugging. Although many differencing algorithms have been proposed for procedural and object-oriented languages like C and Ja...
Martin Th Görg, Jianjun Zhao
DATE
2007
IEEE
173views Hardware» more  DATE 2007»
15 years 8 months ago
Architectural leakage-aware management of partitioned scratchpad memories
Partitioning a memory into multiple blocks that can be independently accessed is a widely used technique to reduce its dynamic power. For embedded systems, its benefits can be ev...
Olga Golubeva, Mirko Loghi, Massimo Poncino, Enric...
126
Voted
ICS
2004
Tsinghua U.
15 years 7 months ago
Applications of storage mapping optimization to register promotion
Storage mapping optimization is a flexible approach to folding array dimensions in numerical codes. It is designed to reduce the memory footprint after a wide spectrum of loop tr...
Patrick Carribault, Albert Cohen
143
Voted
3DPVT
2002
IEEE
193views Visualization» more  3DPVT 2002»
15 years 7 months ago
Modeling shapes and textures from images: new frontiers
Increasingly, models of the world are directly built from images. The paper discusses a number of recent developments that try to push the enveloppe of what image-based modeling c...
Luc J. Van Gool, D. Vandemeulen, Gregor A. Kalbere...