Sciweavers

1801 search results - page 274 / 361
» Pointing without a pointer
Sort
View
MICRO
2008
IEEE
124views Hardware» more  MICRO 2008»
15 years 4 months ago
Token tenure: PATCHing token counting using directory-based cache coherence
Traditional coherence protocols present a set of difficult tradeoffs: the reliance of snoopy protocols on broadcast and ordered interconnects limits their scalability, while dire...
Arun Raghavan, Colin Blundell, Milo M. K. Martin
LCN
2007
IEEE
15 years 4 months ago
Sender Access Control in IP Multicast
—Multicasting has not been widely adopted until now, due to lack of access control over the group members. The Authentication, Authorization and Accounting (AAA) protocols are be...
Salekul Islam, J. William Atwood
DRM
2007
Springer
15 years 4 months ago
Slicing obfuscations: design, correctness, and evaluation
The goal of obfuscation is to transform a program, without affecting its functionality, such that some secret information within the program can be hidden for as long as possible...
Anirban Majumdar, Stephen Drape, Clark D. Thombors...
PSIVT
2007
Springer
129views Multimedia» more  PSIVT 2007»
15 years 4 months ago
Multi-target Tracking with Poisson Processes Observations
This paper considers the problem of Bayesian inference in dynamical models with time-varying dimension. These models have been studied in the context of multiple target tracking pr...
Sergio Hernández, Paul Teal
WOLLIC
2007
Springer
15 years 4 months ago
Symmetries in Natural Language Syntax and Semantics: The Lambek-Grishin Calculus
In this paper, we explore the Lambek-Grishin calculus LG: a symmetric version of categorial grammar based on the generalizations of Lambek calculus studied in Grishin [1]. The voca...
Michael Moortgat