Sciweavers

2421 search results - page 247 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
ICS
1999
Tsinghua U.
15 years 9 months ago
Classifying load and store instructions for memory renaming
Memory operations remain a significant bottleneck in dynamically scheduled pipelined processors, due in part to the inability to statically determine the existence of memory addr...
Glenn Reinman, Brad Calder, Dean M. Tullsen, Gary ...
175
Voted
ECCV
2006
Springer
16 years 6 months ago
PoseCut: Simultaneous Segmentation and 3D Pose Estimation of Humans Using Dynamic Graph-Cuts
Abstract. We present a novel algorithm for performing integrated segmentation and 3D pose estimation of a human body from multiple views. Unlike other related state of the art tech...
Matthieu Bray, Pushmeet Kohli, Philip H. S. Torr
ISSTA
2006
ACM
15 years 10 months ago
Architecture-based testing using goals and plans
This paper presents a specification-based testing approach that compares software specifications defined at different f abstraction, e.g. architecture and implementation, agai...
Kristina Winbladh, Thomas A. Alspaugh, Hadar Ziv, ...
ARCS
2009
Springer
15 years 11 months ago
Improving Memory Subsystem Performance Using ViVA: Virtual Vector Architecture
The disparity between microprocessor clock frequencies and memory latency is a primary reason why many demanding applications run well below peak achievable performance. Software c...
Joseph Gebis, Leonid Oliker, John Shalf, Samuel Wi...
ICWE
2005
Springer
15 years 10 months ago
MDA Transformations Applied to Web Application Development
Current Web generation techniques are mainly hard-coded for predefined architectures of Web applications. Consequently, there is a gap between Web design models and the final imple...
Santiago Meliá, Andreas Kraus, Nora Koch