Sciweavers

320 search results - page 17 / 64
» Run-Time Support for Optimizations Based on Escape Analysis
Sort
View
INFOCOM
2008
IEEE
15 years 4 months ago
Dynamic Jamming Mitigation for Wireless Broadcast Networks
—Wireless communications are inherently symmetric; that is, it takes an attacker the same amount of power to modulate a signal as it does for a legitimate node to modulate the sa...
Jerry T. Chiang, Yih-Chun Hu
CVPR
2006
IEEE
15 years 11 months ago
SVM-KNN: Discriminative Nearest Neighbor Classification for Visual Category Recognition
We consider visual category recognition in the framework of measuring similarities, or equivalently perceptual distances, to prototype examples of categories. This approach is qui...
Alexander C. Berg, Hao Zhang 0003, Jitendra Malik,...
TVCG
2010
168views more  TVCG 2010»
14 years 8 months ago
Principles and Tools for Collaborative Entity-Based Intelligence Analysis
—Software tools that make it easier for analysts to collaborate as a natural part of their work will lead to better analysis that is informed by more perspectives. We are interes...
Eric A. Bier, Stuart K. Card, John W. Bodnar
AOSD
2008
ACM
14 years 11 months ago
Edicts: implementing features with flexible binding times
In a software product line, the binding time of a feature is the time at which one decides to include or exclude a feature from a product. Typical binding site implementations are...
Venkat Chakravarthy, John Regehr, Eric Eide
PPOPP
2006
ACM
15 years 3 months ago
McRT-STM: a high performance software transactional memory system for a multi-core runtime
Applications need to become more concurrent to take advantage of the increased computational power provided by chip level multiprocessing. Programmers have traditionally managed t...
Bratin Saha, Ali-Reza Adl-Tabatabai, Richard L. Hu...