Sciweavers

1804 search results - page 351 / 361
» On set systems with a threshold property
Sort
View
LCTRTS
2004
Springer
15 years 5 months ago
Finding effective compilation sequences
Most modern compilers operate by applying a fixed, program-independent sequence of optimizations to all programs. Compiler writers choose a single “compilation sequence”, or ...
L. Almagor, Keith D. Cooper, Alexander Grosul, Tim...
LOPSTR
2004
Springer
15 years 5 months ago
A Generic Framework for Context-Sensitive Analysis of Modular Programs
Abstract. Context-sensitive analysis provides information which is potentially more accurate than that provided by context-free analysis. Such information can then be applied in or...
Germán Puebla, Jesús Correas, Manuel...
CCS
2003
ACM
15 years 5 months ago
Cryptographic tamper evidence
We propose a new notion of cryptographic tamper evidence. A tamper-evident signature scheme provides an additional procedure Div which detects tampering: given two signatures, Div...
Gene Itkis
ISMIR
2003
Springer
133views Music» more  ISMIR 2003»
15 years 5 months ago
Chord segmentation and recognition using EM-trained hidden markov models
Automatic extraction of content description from commercial audio recordings has a number of important applications, from indexing and retrieval through to novel musicological ana...
Alexander Sheh, Daniel P. W. Ellis
IWDC
2001
Springer
101views Communications» more  IWDC 2001»
15 years 4 months ago
Resource Stealing in Endpoint Controlled Multi-class Networks
Abstract. Endpoint admission control is a mechanism for achieving scalable services by pushing quality-of-service functionality to end hosts. In particular, hosts probe the network...
Susana Sargento, Rui Valadas, Edward W. Knightly