Sciweavers

1702 search results - page 180 / 341
» Doomed program points
Sort
View
JUCS
2007
122views more  JUCS 2007»
15 years 5 months ago
A New Architecture for Concurrent Lazy Cyclic Reference Counting on Multi-Processor Systems
: Multi-processor systems have become the standard in current computer architectures. Software developers have the possibility to take advantage of the additional computing power a...
Andrei de Araújo Formiga, Rafael Dueire Lin...
FGCS
2000
96views more  FGCS 2000»
15 years 4 months ago
Logicflow execution model for parallel databases
The LOGFLOW parallel Prolog system is similar to the recent parallel database systems concerning its dataflow execution model and its capability of running on othing architectures...
Péter Kacsuk, Norbert Podhorszki
PUC
1998
101views more  PUC 1998»
15 years 4 months ago
Palmtop Programmable Appliance Controls
Palmtop PCs with infrared transceivers provide a userfriendly, intelligent, and extensible alternative to the remote controls traditionally used to control home appliances. We des...
Diomidis Spinellis
130
Voted
TSMC
2002
119views more  TSMC 2002»
15 years 4 months ago
Approximation of n-dimensional data using spherical and ellipsoidal primitives
This paper discusses the problem of approximating data points in -dimensional Euclidean space using spherical and ellipsoidal surfaces. A closed form solution is provided for spher...
Giuseppe Carlo Calafiore
TCC
2010
Springer
175views Cryptology» more  TCC 2010»
15 years 3 months ago
Obfuscation of Hyperplane Membership
Previous work on program obfuscation gives strong negative results for general-purpose obfuscators, and positive results for obfuscating simple functions such as equality testing (...
Ran Canetti, Guy N. Rothblum, Mayank Varia