Sciweavers

1039 search results - page 142 / 208
» The Def-inite Approach to Dependency Analysis
Sort
View
PCI
2005
Springer
15 years 7 months ago
Tuning Blocked Array Layouts to Exploit Memory Hierarchy in SMT Architectures
Cache misses form a major bottleneck for memory-intensive applications, due to the significant latency of main memory accesses. Loop tiling, in conjunction with other program tran...
Evangelia Athanasaki, Kornilios Kourtis, Nikos Ana...
ESORICS
2004
Springer
15 years 7 months ago
ARCHERR: Runtime Environment Driven Program Safety
Parameters of a program’s runtime environment such as the machine architecture and operating system largely determine whether a vulnerability can be exploited. For example, the m...
Ramkumar Chinchani, Anusha Iyer, Bharat Jayaraman,...
ICALP
2010
Springer
15 years 6 months ago
Dynamic Programming for Graphs on Surfaces
Abstract. We provide a framework for the design and analysis of dynamic programming algorithms for surface-embedded graphs on n vertices and branchwidth at most k. Our technique ap...
Juanjo Rué, Ignasi Sau, Dimitrios M. Thilik...
ICIAR
2010
Springer
15 years 6 months ago
Real-Time Scale Invariant 3D Range Point Cloud Registration
Abstract. Stereo cameras, laser rangers and other time-of-flight ranging devices are utilized with increasing frequency as they can provide information in the 3D plane. The abilit...
Anuj Sehgal, Daniel Cernea, Milena Makaveeva
SIAMADS
2010
105views more  SIAMADS 2010»
14 years 8 months ago
Nonlinear Patterns in Urban Crime: Hotspots, Bifurcations, and Suppression
We present a weakly nonlinear analysis of our recently developed model for the formation of crime patterns. Using a perturbative approach, we find amplitude equations that govern t...
Martin B. Short, Andrea L. Bertozzi, P. J. Brantin...