Sciweavers

4421 search results - page 566 / 885
» Libraries
Sort
View
MOBISYS
2004
ACM
16 years 3 months ago
An Architecture for Privacy-Sensitive Ubiquitous Computing
Privacy is the most often-cited criticism of ubiquitous computing, and may be the greatest barrier to its long-term success. However, developers currently have little support in d...
Jason I. Hong, James A. Landay
WILF
2009
Springer
487views Fuzzy Logic» more  WILF 2009»
16 years 2 months ago
A combined Fuzzy and Probabilistic data descriptor for distributed CBIR
With the wide diffusion of digital image acquisition devices, the cost of managing hundreds of digital images is quickly increasing. Currently, the main way to search digital ima...
Marco La Cascia, Marco Morana, Roberto Gallea
120
Voted
PLDI
2010
ACM
16 years 24 days ago
The Reachability-Bound Problem
We define the reachability-bound problem to be the problem of finding a symbolic worst-case bound on the number of times a given control location inside a procedure is visited in ...
Sumit Gulwani, Florian Zuleger
108
Voted
POPL
2010
ACM
16 years 24 days ago
Coarse-Grained Transactions
Traditional transactional memory systems suffer from overly conservative conflict detection, yielding so-called false conflicts, because they are based on fine-grained, low-level ...
Eric Koskinen, Matthew Parkinson, Maurice Herlihy
97
Voted
ICCD
2007
IEEE
151views Hardware» more  ICCD 2007»
16 years 11 days ago
Benchmarks and performance analysis of decimal floating-point applications
The IEEE P754 Draft Standard for Floating-point Arithmetic provides specifications for Decimal Floating-Point (DFP) formats and operations. Based on this standard, many developer...
Liang-Kai Wang, Charles Tsen, Michael J. Schulte, ...