Sciweavers

438 search results - page 87 / 88
» The forest hiding problem
Sort
View
JIPS
2007
223views more  JIPS 2007»
13 years 6 months ago
Addressing Mobile Agent Security through Agent Collaboration
: The use of agent paradigm in today’s applications is hampered by the security concerns of agents and hosts alike. The agents require the presence of a secure and trusted execut...
Evens Jean, Yu Jiao, Ali R. Hurson
COMPUTING
2004
204views more  COMPUTING 2004»
13 years 6 months ago
Image Registration by a Regularized Gradient Flow. A Streaming Implementation in DX9 Graphics Hardware
The presented image registration method uses a regularized gradient flow to correlate the intensities in two images. Thereby, an energy functional is successively minimized by des...
Robert Strzodka, Marc Droske, Martin Rumpf
COMPUTER
2002
89views more  COMPUTER 2002»
13 years 6 months ago
A Pattern for Softcoded Values
rs use models or abstractions that hide low-level implementation details. Various kinds of representations such as data models, state-transition models, and dataflow models can hel...
Michael R. Blaha, Cheryl Smith
MICRO
2010
IEEE
270views Hardware» more  MICRO 2010»
13 years 4 months ago
Many-Thread Aware Prefetching Mechanisms for GPGPU Applications
Abstract-- We consider the problem of how to improve memory latency tolerance in massively multithreaded GPGPUs when the thread-level parallelism of an application is not sufficien...
Jaekyu Lee, Nagesh B. Lakshminarayana, Hyesoon Kim...
BMCBI
2011
13 years 1 months ago
Revision history aware repositories of computational models of biological systems
Background: Building repositories of computational models of biological systems ensures that published models are available for both education and further research, and can provid...
Andrew K. Miller, Tommy Yu, Randall Britten, Mike ...