Sciweavers

8312 search results - page 1646 / 1663
» Performance data collection using a hybrid approach
Sort
View
SAS
2009
Springer
149views Formal Methods» more  SAS 2009»
15 years 8 months ago
Creating Transformations for Matrix Obfuscation
There are many programming situations where it would be convenient to conceal the meaning of code, or the meaning of certain variables. This can be achieved through program transfo...
Stephen Drape, Irina Voiculescu
ICDCS
2008
IEEE
15 years 7 months ago
PFC: Transparent Optimization of Existing Prefetching Strategies for Multi-Level Storage Systems
The multi-level storage architecture has been widely adopted in servers and data centers. However, while prefetching has been shown as a crucial technique to exploit the sequentia...
Zhe Zhang, Kyuhyung Lee, Xiaosong Ma, Yuanyuan Zho...
ACIVS
2006
Springer
15 years 7 months ago
Visibility of Point Clouds and Mapping of Unknown Environments
Abstract. We present an algorithm for interpolating the visible portions of a point cloud that are sampled from opaque objects in the environment. Our algorithm projects point clou...
Yanina Landa, Richard Tsai, Li-Tien Cheng
CASES
2006
ACM
15 years 7 months ago
Adapting compilation techniques to enhance the packing of instructions into registers
The architectural design of embedded systems is becoming increasingly idiosyncratic to meet varying constraints regarding energy consumption, code size, and execution time. Tradit...
Stephen Hines, David B. Whalley, Gary S. Tyson
WOWMOM
2005
ACM
148views Multimedia» more  WOWMOM 2005»
15 years 6 months ago
Evaluation of Peer-to-Peer Network Content Discovery Techniques over Mobile Ad Hoc Networks
Both Mobile Ad Hoc Networks (MANETs) and Peer-toPeer (P2P) Networks are decentralized and self-organizing networks with dynamic topology and responsible for routing queries in a d...
Leonardo B. Oliveira, Isabela G. Siqueira, Daniel ...
« Prev « First page 1646 / 1663 Last » Next »