Sciweavers

4911 search results - page 715 / 983
» Tree dependence analysis
Sort
View
112
Voted
MATES
2005
Springer
15 years 9 months ago
Reconciling Agent Ontologies for Web Service Applications
Because there is still no agreed-upon global ontology, Web services supplied by different providers typically have individual and unique semantics, described by independently devel...
Jingshan Huang, Rosa Laura Zavala Gutierrez, Benit...
PCI
2005
Springer
15 years 9 months ago
Tuning Blocked Array Layouts to Exploit Memory Hierarchy in SMT Architectures
Cache misses form a major bottleneck for memory-intensive applications, due to the significant latency of main memory accesses. Loop tiling, in conjunction with other program tran...
Evangelia Athanasaki, Kornilios Kourtis, Nikos Ana...
SCIA
2005
Springer
174views Image Analysis» more  SCIA 2005»
15 years 9 months ago
Object Localization with Boosting and Weak Supervision for Generic Object Recognition
Abstract. This paper deals, for the first time, with an analysis of localization capabilities of weakly supervised categorization systems. Most existing categorization approaches ...
Andreas Opelt, Axel Pinz
137
Voted
ADHOCNOW
2004
Springer
15 years 9 months ago
Cross-Layer Optimization for High Density Sensor Networks: Distributed Passive Routing Decisions
Abstract. The resource limited nature of WSNs require that protocols implemented on these networks be energy-efficient, scalable and distributed. This paper presents an analysis of...
Primoz Skraba, Hamid K. Aghajan, Ahmad Bahai
128
Voted
ESORICS
2004
Springer
15 years 9 months ago
ARCHERR: Runtime Environment Driven Program Safety
Parameters of a program’s runtime environment such as the machine architecture and operating system largely determine whether a vulnerability can be exploited. For example, the m...
Ramkumar Chinchani, Anusha Iyer, Bharat Jayaraman,...