Sciweavers

1652 search results - page 279 / 331
» Matching Vector Codes
Sort
View
EXPERT
2006
84views more  EXPERT 2006»
14 years 11 months ago
Infrastructure for Engineered Emergence on Sensor/Actuator Networks
abstraction rules that hide the complexity of systems of components. We've begun this process in the domain of sensor/actuator network applications, observing that in manyappl...
Jacob Beal, Jonathan Bachrach
MST
2010
146views more  MST 2010»
14 years 6 months ago
The Cache-Oblivious Gaussian Elimination Paradigm: Theoretical Framework, Parallelization and Experimental Evaluation
We consider triply-nested loops of the type that occur in the standard Gaussian elimination algorithm, which we denote by GEP (or the Gaussian Elimination Paradigm). We present tw...
Rezaul Alam Chowdhury, Vijaya Ramachandran
DAC
2008
ACM
16 years 6 days ago
Automated hardware-independent scenario identification
Scenario-based design exploits the time-varying execution behavior of applications by dynamically adapting the system on which they run. This is a particularly interesting design ...
Juan Hamers, Lieven Eeckhout
PLDI
2009
ACM
15 years 6 months ago
TAJ: effective taint analysis of web applications
Taint analysis, a form of information-flow analysis, establishes whether values from untrusted methods and parameters may flow into security-sensitive operations. Taint analysis...
Omer Tripp, Marco Pistoia, Stephen J. Fink, Manu S...
ICRA
2007
IEEE
143views Robotics» more  ICRA 2007»
15 years 5 months ago
Inverse Depth to Depth Conversion for Monocular SLAM
— Recently it has been shown that an inverse depth parametrization can improve the performance of real-time monocular EKF SLAM, permitting undelayed initialization of features at...
Javier Civera, Andrew J. Davison, J. M. M. Montiel