Sciweavers

17450 search results - page 365 / 3490
» Numerical Methods with Applications
Sort
View
ASAP
2009
IEEE
131views Hardware» more  ASAP 2009»
15 years 10 months ago
Constraint-Driven Instructions Selection and Application Scheduling in the DURASE system
This paper presents a new constraint-driven method for computational pattern selection, mapping and application scheduling using reconfigurable processor extensions. The presente...
Kevin Martin, Christophe Wolinski, Krzysztof Kuchc...
ICPPW
2002
IEEE
15 years 9 months ago
Experiments with Parallelizing a Tribology Application
Different parallelization methods vary in their system requirements, programming styles, efficiency of exploring parallelism, and the application characteristics they can handle....
Vipin Chaudhary, W. L. Hase, Hai Jiang, L. Sun, Da...
FM
2009
Springer
95views Formal Methods» more  FM 2009»
15 years 11 months ago
Industrial Practice in Formal Methods: A Review
We examine the the industrial application of formal methods using data gathered in a review of 62 projects taking place over the last 25 years. The review suggests that formal meth...
Juan Bicarregui, John S. Fitzgerald, Peter Gorm La...
IEEEPACT
1998
IEEE
15 years 9 months ago
Exploiting Method-Level Parallelism in Single-Threaded Java Programs
Method speculation of object-oriented programs attempts to exploit method-level parallelism (MLP) by executing sequential method invocations in parallel, while still maintaining c...
Michael K. Chen, Kunle Olukotun
ICIAR
2005
Springer
15 years 10 months ago
A Steganographic Method for Digital Images Robust to RS Steganalysis
Digital images are increasingly being used as steganographic covers for secret communication. The Least Significant Bit (LSB) encoding is one of the most widely used methods for e...
André R. S. Marçal, Patricia R. Pere...