Sciweavers

6253 search results - page 1037 / 1251
» Use Case Modeling Guidelines
Sort
View
CODES
2006
IEEE
15 years 10 months ago
Streamroller: : automatic synthesis of prescribed throughput accelerator pipelines
In this paper, we present a methodology for designing a pipeline of accelerators for an application. The application is modeled using sequential C language with simple stylization...
Manjunath Kudlur, Kevin Fan, Scott A. Mahlke
ICDCS
2006
IEEE
15 years 10 months ago
On the Access Pricing Issues of Wireless Mesh Networks
This paper studies the use of pricing as an incentive mechanism to encourage private, self-interested nodes to participate in a public wireless mesh network and cooperate in the p...
Ray K. Lam, John C. S. Lui, Dah-Ming Chiu
BPM
2005
Springer
97views Business» more  BPM 2005»
15 years 9 months ago
Service Interaction Patterns
Abstract. With increased sophistication and standardization of modeling languages and execution platforms supporting business process management (BPM) across traditional boundaries...
Alistair P. Barros, Marlon Dumas, Arthur H. M. ter...
EMMCVPR
2005
Springer
15 years 9 months ago
Linear Programming Matching and Appearance-Adaptive Object Tracking
Abstract. In this paper, we present a novel successive relaxation linear programming scheme for solving the important class of consistent labeling problems for which an L1 metric i...
Hao Jiang, Mark S. Drew, Ze-Nian Li
INDOCRYPT
2003
Springer
15 years 9 months ago
On Multiplicative Linear Secret Sharing Schemes
We consider both information-theoretic and cryptographic settings for Multi-Party Computation (MPC), based on the underlying linear secret sharing scheme. Our goal is to study the ...
Ventzislav Nikov, Svetla Nikova, Bart Preneel
« Prev « First page 1037 / 1251 Last » Next »