Sciweavers

1638 search results - page 140 / 328
» Properties of input-consuming derivations
Sort
View
ICLP
2007
Springer
15 years 2 months ago
User-Definable Resource Bounds Analysis for Logic Programs
We present a static analysis that infers both upper and lower bounds on the usage that a logic program makes of a set of user-definable resources. The inferred bounds will in gener...
Jorge Navas, Edison Mera, Pedro López-Garc&...
ICASSP
2009
IEEE
15 years 2 months ago
Directed Markov Stationary Features for visual classification
We investigate how to effectively incorporate spatial structure information into histogram features for boosting visual classification performance motivated by recently proposed M...
Bingbing Ni, Shuicheng Yan, Ashraf A. Kassim
EUROMICRO
2009
IEEE
15 years 2 months ago
Service Redundancy Strategies in Service-Oriented Architectures
Redundancy can improve the availability of components in service-oriented systems. However, predicting and quantifying the effects of different redundancy strategies can be a comp...
Nicholas R. May, Heinz W. Schmidt, Ian E. Thomas
ACNS
2006
Springer
241views Cryptology» more  ACNS 2006»
15 years 2 months ago
High Diffusion Cipher: Encryption and Error Correction in a Single Cryptographic Primitive
In this paper we combine the error correction and encryption functionality into one block cipher, which we call High Diffusion (HD) cipher. The error correcting property of this ci...
Chetan Nanjunda Mathur, Karthik Narayan, K. P. Sub...
BROADNETS
2004
IEEE
15 years 2 months ago
Routing in Ad Hoc Networks-A Wireless Perspective
Traditionally, the routing problem is addressed at the network layer, an approach that has been extended to the wireless realm. In wireless multihop networks, however, strict laye...
Martin Haenggi