Sciweavers

1516 search results - page 168 / 304
» Generalizing Indexical-Functional Reference
Sort
View
HOST
2008
IEEE
15 years 4 months ago
Detecting Malicious Inclusions in Secure Hardware: Challenges and Solutions
This paper addresses a new threat to the security of integrated circuits (ICs) used in safety critical, security and military systems. The migration of IC fabrication to low-cost ...
Xiaoxiao Wang, Mohammad Tehranipoor, Jim Plusquell...
IAT
2008
IEEE
15 years 4 months ago
Evolving Logic Programming Based Agents with Temporal Operators
Logic Programming Update Languages were proposed as an extension of logic programming, which allow for modelling the dynamics of knowledge bases where both extensional knowledge (...
José Júlio Alferes, Alfredo Gabaldon...
IEEEPACT
2008
IEEE
15 years 4 months ago
Redundancy elimination revisited
This work proposes and evaluates improvements to previously known algorithms for redundancy elimination. Enhanced Scalar Replacement combines two classic techniques, scalar replac...
Keith D. Cooper, Jason Eckhardt, Ken Kennedy
3DIM
2007
IEEE
15 years 4 months ago
A Bayesian Framework for Simultaneous Matting and 3D Reconstruction
Conventional approaches to 3D scene reconstruction often treat matting and reconstruction as two separate problems, with matting a prerequisite to reconstruction. The problem with...
Jean-Yves Guillemaut, Adrian Hilton, Jonathan Star...
DATE
2007
IEEE
89views Hardware» more  DATE 2007»
15 years 4 months ago
Mapping multi-dimensional signals into hierarchical memory organizations
The storage requirements of the array-dominated and looporganized algorithmic specifications running on embedded systems can be significant. Employing a data memory space much l...
Hongwei Zhu, Ilie I. Luican, Florin Balasa