Sciweavers

2624 search results - page 293 / 525
» The 2LIP model and its implementations
Sort
View
SPAA
2005
ACM
15 years 6 months ago
Efficient algorithms for verifying memory consistency
One approach in verifying the correctness of a multiprocessor system is to show that its execution results comply with the memory consistency model it is meant to implement. It ha...
Chaiyasit Manovit, Sudheendra Hangal
NDSS
2003
IEEE
15 years 6 months ago
Access Control Based on Execution History
Security is a major, frequent concern in extensible software systems such as Java Virtual Machines and the Common Language Runtime. These systems aim to enable simple, classic app...
Martín Abadi, Cédric Fournet
114
Voted
ICML
2003
IEEE
16 years 1 months ago
Exploration and Exploitation in Adaptive Filtering Based on Bayesian Active Learning
In the task of adaptive information filtering, a system receives a stream of documents but delivers only those that match a person's information need. As the system filters i...
Yi Zhang, Wei Xu, James P. Callan
144
Voted
SMI
2008
IEEE
255views Image Analysis» more  SMI 2008»
15 years 7 months ago
GPU-accelerated surface denoising and morphing with lattice Boltzmann scheme
In this paper, we introduce a parallel numerical scheme, the lattice Boltzmann method, to shape modeling applications. The motivation of using this originally-designed fluid dyna...
Ye Zhao
101
Voted
WAC
2004
Springer
15 years 6 months ago
A Metabolic Approach to Protocol Resilience
The goal of this research is to create robust execution circuits for communication software which can distribute over a network and which continues to provide its service despite p...
Christian F. Tschudin, Lidia Yamamoto