Sciweavers

2200 search results - page 178 / 440
» The Generalized Pignistic Transformation
Sort
View
DRM
2007
Springer
15 years 6 months ago
Slicing obfuscations: design, correctness, and evaluation
The goal of obfuscation is to transform a program, without affecting its functionality, such that some secret information within the program can be hidden for as long as possible...
Anirban Majumdar, Stephen Drape, Clark D. Thombors...
89
Voted
SCALESPACE
2007
Springer
15 years 6 months ago
Scale Spaces on Lie Groups
In the standard scale space approach one obtains a scale space representation u : Rd R+ → R of an image f ∈ L2(Rd ) by means of an evolution equation on the additive group (Rd ...
Remco Duits, Bernhard Burgeth
140
Voted
CASES
2006
ACM
15 years 6 months ago
Automatic performance model construction for the fast software exploration of new hardware designs
Developing an optimizing compiler for a newly proposed architecture is extremely difficult when there is only a simulator of the machine available. Designing such a compiler requ...
John Cavazos, Christophe Dubach, Felix V. Agakov, ...
119
Voted
FPGA
2004
ACM
126views FPGA» more  FPGA 2004»
15 years 6 months ago
A synthesis oriented omniscient manual editor
The cost functions used to evaluate logic synthesis transformations for FPGAs are far removed from the final speed and routability determined after placement, routing and timing a...
Tomasz S. Czajkowski, Jonathan Rose
VDA
2010
200views Visualization» more  VDA 2010»
15 years 3 months ago
Operator-centric design patterns for information visualization software
Design patterns have proven to be a useful means to make the process of designing, developing, and reusing software systems more efficient. In the area of information visualizatio...
Zaixian Xie, Zhenyu Guo, Matthew O. Ward, Elke A. ...