Sciweavers

5344 search results - page 428 / 1069
» Privacy-Preserving Set Operations
Sort
View
LATIN
2010
Springer
15 years 12 months ago
The Language Theory of Bounded Context-Switching
Concurrent compositions of recursive programs with finite a natural abstraction model for concurrent programs. Since reachability is undecidable for this class, a restricted form ...
Salvatore La Torre, Parthasarathy Madhusudan, Genn...
SAC
2009
ACM
15 years 12 months ago
On scheduling soft real-time tasks with lock-free synchronization for embedded devices
In this paper, we consider minimizing the system-level energy consumption through dynamic voltage scaling for embedded devices, while a) allowing concurrent access to shared objec...
Shouwen Lai, Binoy Ravindran, Hyeonjoong Cho
LATA
2009
Springer
15 years 12 months ago
Bounded Hairpin Completion
We consider a restricted variant of the hairpin completion called bounded hairpin completion. The hairpin completion is a formal operation inspired from biochemistry. Applied to a ...
Masami Ito, Peter Leupold, Victor Mitrana
144
Voted
IPPS
2009
IEEE
15 years 11 months ago
Double Throughput Multiply-Accumulate unit for FlexCore processor enhancements
— As a simple five-stage General-Purpose Processor (GPP), the baseline FlexCore processor has a limited set of datapath units. By utilizing a flexible datapath interconnect and...
Tung Thanh Hoang, Magnus Själander, Per Larss...
ISDA
2009
IEEE
15 years 11 months ago
Event Related Biometrics: Towards an Unobtrusive Sensing Seat System for Continuous Human Authentication
—The present work is focused on the improvement of a Sensing Seat system previously developed by the authors for the initial authentication purpose in office and car scenarios. ...
Marcello Ferro, Giovanni Pioggia, Alessandro Togne...