Sciweavers

23557 search results - page 4465 / 4712
» Distributed Computing - Introduction
Sort
View
125
Voted
PLDI
1990
ACM
15 years 6 months ago
A Fresh Look at Optimizing Array Bound Checking
- This paper describes techniques for optimizing range checks performed to detect array bound violations. In addition to the elimination of range check:s, the optimizations discuss...
Rajiv Gupta
127
Voted
SIGCSE
1990
ACM
126views Education» more  SIGCSE 1990»
15 years 6 months ago
A philosophy and example of CS-1 programming projects
This paper presents a philosophy underlying CS-1 programming projects, and illustrates this philosophy with a concrete example. Integral to the philosophy is the use of Ada packag...
Richard E. Pattis
126
Voted
ECUMN
2007
Springer
15 years 6 months ago
Characterization of Slice-Based H.264/AVC Encoded Video Traffic
An explicit slice-based mode type selection scheme for use in H.264/AVC has recently been developed, which preserves the coding efficiency of H.264/AVC without requiring any modif...
Astrid Undheim, Yuan Lin, Peder J. Emstad
130
Voted
COMPGEOM
2010
ACM
15 years 6 months ago
Manifold reconstruction using tangential Delaunay complexes
We give a provably correct algorithm to reconstruct a kdimensional manifold embedded in d-dimensional Euclidean space. Input to our algorithm is a point sample coming from an unkn...
Jean-Daniel Boissonnat, Arijit Ghosh
126
Voted
PERCOM
2010
ACM
15 years 6 months ago
Adaptive deployment for pervasive data gathering in connectivity-challenged environments
—Some current and future pervasive data driven applications must operate in ”extreme” environments where endto-end connectivity cannot be guaranteed at all times. In fact, it...
Tahiry Razafindralambo, Nathalie Mitton, Aline Car...
« Prev « First page 4465 / 4712 Last » Next »