Sciweavers

3113 search results - page 617 / 623
» Efficiently Generating Efficient Generating Extensions in Pr...
Sort
View
ICFP
2001
ACM
15 years 9 months ago
Functioning without Closure: Type-Safe Customized Function Representations for Standard ML
The CIL compiler for core Standard ML compiles whole ML programs using a novel typed intermediate language that supports the generation of type-safe customized data representation...
Allyn Dimock, Ian Westmacott, Robert Muller, Frank...
ICCAD
2005
IEEE
127views Hardware» more  ICCAD 2005»
15 years 6 months ago
Hardware synthesis from guarded atomic actions with performance specifications
We present a new hardware synthesis methodology for guarded atomic actions (or rules), which satisfies performance-related scheduling specifications provided by the designer. The ...
Daniel L. Rosenband
85
Voted
AINA
2009
IEEE
15 years 4 months ago
JPEG Steganography: A Performance Evaluation of Quantization Tables
The two most important aspects of any imagebased steganographic system are the imperceptibility and the capacity of the stego image. This paper evaluates the performance and effic...
Adel Almohammad, Gheorghita Ghinea, Robert M. Hier...
VRCAI
2004
ACM
15 years 3 months ago
A novel approach to extract triangle strips for iso-surfaces in volumes
The Marching Cubes (MC) algorithm is a popular approach to extract iso-surfaces from volumetric data. This approach extracts triangles from the volume data for a specific iso-valu...
Jagannathan Lakshmipathy, Wieslaw L. Nowinski, Eri...
SIGIR
2003
ACM
15 years 2 months ago
eBizSearch: a niche search engine for e-business
Niche Search Engines offer an efficient alternative to traditional search engines when the results returned by general-purpose search engines do not provide a sufficient degree of...
C. Lee Giles, Yves Petinot, Pradeep B. Teregowda, ...