Sciweavers

1234 search results - page 161 / 247
» Privacy-preserving Virtual Machine
Sort
View
124
Voted
ICCD
2003
IEEE
143views Hardware» more  ICCD 2003»
16 years 21 days ago
Cost-Effective Graceful Degradation in Speculative Processor Subsystems: The Branch Prediction Case
We analyze the effect of errors in branch predictors, a representative example of speculative processor subsystems, to motivate the necessity for fault tolerance in such subsystem...
Sobeeh Almukhaizim, Thomas Verdel, Yiorgos Makris
ICASSP
2009
IEEE
15 years 10 months ago
Incorporating prior knowledge on the digital media creation process into audio classifiers
In the process of music content creation, a wide range of typical audio effects such as reverberation, equalization or dynamic compression are very commonly used. Despite the fact...
Maxime Lardeur, Slim Essid, Gaël Richard, Mar...
114
Voted
ICDAR
2009
IEEE
15 years 10 months ago
Online Recognition of Multi-Stroke Symbols with Orthogonal Series
We propose an efficient method to recognize multi-stroke handwritten symbols. The method is based on computing the truncated Legendre-Sobolev expansions of the coordinate functio...
Oleg Golubitsky, Stephen M. Watt
125
Voted
TOOLS
2009
IEEE
15 years 10 months ago
PyGirl: Generating Whole-System VMs from High-Level Prototypes Using PyPy
Abstract. Virtual machines (VMs) emulating hardware devices are generally implemented in low-level languages for performance reasons. This results in unmaintainable systems that ar...
Camillo Bruni, Toon Verwaest
170
Voted
JTRES
2009
ACM
15 years 10 months ago
Real time Java on resource-constrained platforms with Fiji VM
Real-time Java is quickly emerging as a platform for building safety-critical embedded systems. The real-time variants of Java, including [8, 15], are attractive alternatives to A...
Filip Pizlo, Lukasz Ziarek, Jan Vitek