Sciweavers

1264 search results - page 240 / 253
» The IT Performance Evaluation in the Construction Industry
Sort
View
94
Voted
CGO
2010
IEEE
15 years 6 months ago
Linear scan register allocation on SSA form
The linear scan algorithm for register allocation provides a good register assignment with a low compilation overhead and is thus frequently used for just-in-time compilers. Altho...
Christian Wimmer, Michael Franz
CCS
2009
ACM
15 years 6 months ago
Ripley: automatically securing web 2.0 applications through replicated execution
Rich Internet applications are becoming increasingly distributed, as demonstrated by the popularity of AJAX or Web 2.0 applications such as Facebook, Google Maps, Hotmail and many...
K. Vikram, Abhishek Prateek, V. Benjamin Livshits
SAS
2009
Springer
149views Formal Methods» more  SAS 2009»
15 years 6 months ago
Creating Transformations for Matrix Obfuscation
There are many programming situations where it would be convenient to conceal the meaning of code, or the meaning of certain variables. This can be achieved through program transfo...
Stephen Drape, Irina Voiculescu
ICC
2009
IEEE
120views Communications» more  ICC 2009»
15 years 6 months ago
Back-of-the-Envelope Computation of Throughput Distributions in CSMA Wireless Networks
— This paper presents a simple method for computing throughputs of links in a CSMA network. We call our method back-of-the-envelop (BoE) computation, because for many network con...
Soung Chang Liew, Caihong Kai, Jason Leung, Bill W...
CIVR
2009
Springer
212views Image Analysis» more  CIVR 2009»
15 years 6 months ago
NUS-WIDE: a real-world web image database from National University of Singapore
This paper introduces a web image dataset created by NUS’s Lab for Media Search. The dataset includes: (1) 269,648 images and the associated tags from Flickr, with a total of 5,...
Tat-Seng Chua, Jinhui Tang, Richang Hong, Haojie L...