Sciweavers

5344 search results - page 887 / 1069
» Privacy-Preserving Set Operations
Sort
View
171
Voted
MICRO
1998
IEEE
108views Hardware» more  MICRO 1998»
15 years 7 months ago
Exploiting Instruction Level Parallelism in Geometry Processing for Three Dimensional Graphics Applications
Three dimensional (3D) graphics applications have become very important workloads running on today's computer systems. A cost-effective graphics solution is to perform geomet...
Chia-Lin Yang, Barton Sano, Alvin R. Lebeck
137
Voted
RTCSA
1998
IEEE
15 years 7 months ago
Partition Scheduling in APEX Runtime Environment for Embedded Avionics Software
Advances in the computer technology encouraged the avionics industry to replace the federated design of control units with an integrated suite of control modules that share the co...
Yann-Hang Lee, Daeyoung Kim, Mohamed F. Younis, Je...
151
Voted
MOBICOM
1998
ACM
15 years 7 months ago
On Programmable Universal Mobile Channels in a Cellular Internet
In this paper we introduce universal mobile channels, a le communications abstraction that enables users and service providers to program application-speci c adaptive mobile servi...
Raymond R.-F. Liao, Andrew T. Campbell
128
Voted
INFOCOM
1997
IEEE
15 years 7 months ago
A Near-Optimal Packet Scheduler for QoS Networks
A packet scheduler in a quality-of-service QoS network should be sophisticated enough to support stringent QoS constraints at high loads, but it must also have a simple implemen...
Dallas E. Wrege, Jörg Liebeherr
179
Voted
SAS
1992
Springer
171views Formal Methods» more  SAS 1992»
15 years 7 months ago
Static Analysis of CLP Programs over Numeric Domains
Abstract Constraint logic programming (CLP) is a generalization of the pure logic programming paradigm, having similar model-theoretic, fixpoint and operational semantics [9]. Sinc...
Roberto Bagnara, Roberto Giacobazzi, Giorgio Levi