Sciweavers

1635 search results - page 312 / 327
» Design Productivity for Configurable Computing
Sort
View
PLDI
2006
ACM
15 years 3 months ago
Refactoring programs to secure information flows
Adding a sound information flow security policy to an existing program is a difficult task that requires major analysis of and changes to the program. In this paper we show how ...
Scott F. Smith, Mark Thober
SENSYS
2006
ACM
15 years 3 months ago
Funneling-MAC: a localized, sink-oriented MAC for boosting fidelity in sensor networks
Sensor networks exhibit a unique funneling effect which is a product of the distinctive many-to-one, hop-by-hop traffic pattern found in sensor networks, and results in a signific...
Gahng-Seop Ahn, Se Gi Hong, Emiliano Miluzzo, Andr...
DIAGRAMS
2004
Springer
15 years 2 months ago
Bayesian Boxes: A Colored Calculator for Picturing Posteriors
The need for Bayesian inference arises in military intelligence, medical diagnosis and many other practical applications. The problem is that human inferences are generally conserv...
Kevin Burns
ISLPED
2003
ACM
115views Hardware» more  ISLPED 2003»
15 years 2 months ago
Reducing energy and delay using efficient victim caches
In this paper, we investigate methods for improving the hit rates in the first level of memory hierarchy. Particularly, we propose victim cache structures to reduce the number of ...
Gokhan Memik, Glenn Reinman, William H. Mangione-S...
DIGRA
2003
Springer
15 years 2 months ago
Space, Agency, Meaning and Drama in Navigable Real-Time Virtual Environments
Does our preoccupation with navigable space distract us from the expressive potential of interactive media? Can our understanding of spatial context in virtual environments (VEs) ...
Stanislav Roudavski, François Penz