Sciweavers

2771 search results - page 540 / 555
» Locality of Queries and Transformations
Sort
View
TJS
2002
160views more  TJS 2002»
14 years 11 months ago
Adaptive Optimizing Compilers for the 21st Century
Historically, compilers have operated by applying a fixed set of optimizations in a predetermined order. We call such an ordered list of optimizations a compilation sequence. This...
Keith D. Cooper, Devika Subramanian, Linda Torczon
PAMI
2007
157views more  PAMI 2007»
14 years 11 months ago
Pores and Ridges: High-Resolution Fingerprint Matching Using Level 3 Features
—Fingerprint friction ridge details are generally described in a hierarchical order at three different levels, namely, Level 1 (pattern), Level 2 (minutia points), and Level 3 (p...
Anil K. Jain, Yi Chen, Meltem Demirkus
TKDE
2008
141views more  TKDE 2008»
14 years 11 months ago
Location Fingerprinting In A Decorrelated Space
We present a novel approach to the problem of the indoor localization in wireless environments. The main contribution of this paper is four folds: (a) We show that, by projecting t...
Shih-Hau Fang, Tsung-Nan Lin, Po-Chiang Lin
INFOCOM
2010
IEEE
14 years 10 months ago
Network Coding Tomography for Network Failures
—Network Tomography (or network monitoring) uses end-to-end path-level measurements to characterize the network, such as topology estimation and failure detection. This work prov...
Hongyi Yao, Sidharth Jaggi, Minghua Chen
SCN
2010
Springer
143views Communications» more  SCN 2010»
14 years 10 months ago
History-Free Aggregate Message Authentication Codes
Aggregate message authentication codes, as introduced by Katz and Lindell (CT-RSA 2008), combine several MACs into a single value, which has roughly the same size as an ordinary MA...
Oliver Eikemeier, Marc Fischlin, Jens-Fabian G&oum...