Sciweavers

3244 search results - page 555 / 649
» Extensions to Description Logics
Sort
View
ECMDAFA
2010
Springer
138views Hardware» more  ECMDAFA 2010»
14 years 8 months ago
A UML 2.0 Profile to Model Block Cipher Algorithms
Abstract. Current mobile digital communication systems must implement rigorous operations to guarantee high levels of confidentiality and integrity during transmission of critical ...
Tomás Balderas-Contreras, Gustavo Rodr&iacu...
ICIP
2010
IEEE
14 years 8 months ago
Affine-invariant modeling of shape-appearance images applied on sign language handshape classification
We propose a novel affine-invariant modeling of hand shapeappearance images, which offers a compact and descriptive representation of the hand configurations. Our approach combine...
Anastasios Roussos, Stavros Theodorakis, Vassilis ...
109
Voted
IPPS
2010
IEEE
14 years 8 months ago
Offline library adaptation using automatically generated heuristics
Automatic tuning has emerged as a solution to provide high-performance libraries for fast changing, increasingly complex computer architectures. We distinguish offline adaptation (...
Frédéric de Mesmay, Yevgen Voronenko...
GCC
2009
Springer
14 years 8 months ago
Interfaces for Placement, Migration, and Monitoring of Virtual Machines in Federated Clouds
Current cloud computing infrastructure offerings are lacking in interoperability, which is a hindrance to the advancement and adoption of the cloud computing paradigm. As clouds ar...
Erik Elmroth, Lars Larsson
99
Voted
NETWORKS
2011
14 years 5 months ago
On cut-based inequalities for capacitated network design polyhedra
In this article we study capacitated network design problems. We unify and extend polyhedral results for directed, bidirected and undirected link capacity models. Based on valid i...
Christian Raack, Arie M. C. A. Koster, Sebastian O...