Sciweavers

1885 search results - page 169 / 377
» Optimization of Component Connections for an Embedded Compon...
Sort
View
TCS
2010
14 years 8 months ago
Arrows for secure information flow
This paper presents an embedded security sublanguage for enforcing informationflow policies in the standard Haskell programming language. The sublanguage provides useful informat...
Peng Li, Steve Zdancewic
KDD
1995
ACM
98views Data Mining» more  KDD 1995»
15 years 1 months ago
Optimization and Simplification of Hierarchical Clusterings
Clustering is often used to discover structure in data. Clustering systems differ in the objective function used to evaluate clustering quality and the control strategy used to se...
Douglas Fisher
BILDMED
2006
135views Algorithms» more  BILDMED 2006»
14 years 11 months ago
Restoration of the Sphere-Cortex Homeomorphism
Abstract. The proposed algorithm has been developed as a pre-processing tool for inflating cortical surface meshes, which have been created using segmentation and subsequent triang...
Andreas Mang, Michael Wagner 0002, Jan Müller...
DEXA
2005
Springer
109views Database» more  DEXA 2005»
15 years 3 months ago
Formalizing the XML Schema Matching Problem as a Constraint Optimization Problem
The first step in finding an efficient way to solve any difficult problem is making a complete, possibly formal, problem specification. This paper introduces a formal specifica...
Marko Smiljanic, Maurice van Keulen, Willem Jonker
CASES
2004
ACM
15 years 3 months ago
Safely exploiting multithreaded processors to tolerate memory latency in real-time systems
A coarse-grain multithreaded processor can effectively hide long memory latencies by quickly switching to an alternate task when the active task issues a memory request, improving...
Ali El-Haj-Mahmoud, Eric Rotenberg