Sciweavers

1702 search results - page 222 / 341
» Doomed program points
Sort
View
CDES
2006
136views Hardware» more  CDES 2006»
15 years 6 months ago
Using Task Recomputation During Application Mapping in Parallel Embedded Architectures
- Many memory-sensitive embedded applications can tolerate small performance degradations if doing so can reduce the memory space requirements significantly. This paper explores th...
Suleyman Tosun, Mahmut T. Kandemir, Hakduran Koc
CATA
2003
15 years 6 months ago
Implementation and Performance Evaluation of Intel VTUNE Image Processing Functions in the MATLAB Environment
Many current general purpose processors use extensions to the instruction set architecture to enhance the performance of digital image processing and multimedia applications. In t...
Phaisit Chewputtanagul, David Jeff Jackson, Kennet...
DGO
2003
86views Education» more  DGO 2003»
15 years 6 months ago
The role of a search agent for disenfranchised users
Connected Kids project is about developing a searchable database system for the disenfranchised people of the city of Troy, New York. The various events and programs for the young...
Mousumi Chatterjee, Sibel Adali
133
Voted
DBSEC
2000
95views Database» more  DBSEC 2000»
15 years 6 months ago
Wrappers - a mechanism to support state-based authorisation in Web applications
The premises of this paper are 1) security is application dependent because application semantics directly influence proper protection; but 2) applications are generally too compl...
Martin S. Olivier, Ehud Gudes
AAAI
1993
15 years 6 months ago
Generating Quasi-symbolic Representation of Three-Dimensional Flow
Understanding flow in the three-dimensional phase space is challenging both to human experts and to current computer science technology. To break through the barrier, we are build...
Toyoaki Nishida