Sciweavers

1559 search results - page 160 / 312
» The Semantics of Future and Its Use in Program Optimizations
Sort
View
CCS
2009
ACM
15 years 10 months ago
Efficient IRM enforcement of history-based access control policies
Inlined Reference Monitor (IRM) is an established enforcement mechanism for history-based access control policies. IRM enforcement injects monitoring code into the binary of an un...
Fei Yan, Philip W. L. Fong
ICIP
2007
IEEE
15 years 11 months ago
Rate-Distortion Optimal Depth Maps in the Wavelet Domain for Free-Viewpoint Rendering
We consider the problem of estimating and encoding depth maps from multiple views in the context of 3D-TV with free-viewpoint rendering. We propose a novel codec based on the Rate...
Matthieu Maitre, Yoshihisa Shinagawa, Minh N. Do
DEXA
2010
Springer
226views Database» more  DEXA 2010»
14 years 8 months ago
Vi-DIFF: Understanding Web Pages Changes
Nowadays, many applications are interested in detecting and discovering changes on the web to help users to understand page updates and more generally, the web dynamics. Web archiv...
Zeynep Pehlivan, Myriam Ben Saad, Stéphane ...
99
Voted
DATE
2009
IEEE
103views Hardware» more  DATE 2009»
15 years 2 months ago
Fault-tolerant average execution time optimization for general-purpose multi-processor system-on-chips
1 Fault-tolerance is due to the semiconductor technology development important, not only for safety-critical systems but also for general-purpose (non-safety critical) systems. How...
Mikael Väyrynen, Virendra Singh, Erik Larsson
92
Voted
SARA
2009
Springer
15 years 2 months ago
Rewriting Constraint Models with Metamodels
An important challenge in constraint programming is to rewrite constraint models into executable programs calculating the solutions. This phase of constraint processing may requir...
Raphaël Chenouard, Laurent Granvilliers, Rica...