Sciweavers

1687 search results - page 183 / 338
» Which pointer analysis should I use
Sort
View
CODES
2008
IEEE
15 years 11 months ago
Cache-aware optimization of BAN applications
Body-area sensor network or BAN-based health monitoring is increasingly becoming a popular alternative to traditional wired bio-monitoring techniques. However, most biomonitoring ...
Yun Liang, Lei Ju, Samarjit Chakraborty, Tulika Mi...
ACL
2008
15 years 6 months ago
A Critical Reassessment of Evaluation Baselines for Speech Summarization
We assess the current state of the art in speech summarization, by comparing a typical summarizer on two different domains: lecture data and the SWITCHBOARD corpus. Our results ca...
Gerald Penn, Xiaodan Zhu
ESA
1998
Springer
162views Algorithms» more  ESA 1998»
15 years 8 months ago
External Memory Algorithms
Abstract. Data sets in large applications are often too massive to t completely inside the computer's internal memory. The resulting input output communication or I O between ...
Jeffrey Scott Vitter
DATE
2006
IEEE
115views Hardware» more  DATE 2006»
15 years 10 months ago
Management of complex automotive communication networks
Automakers are still facing an increasing complexity in vehicle requirements with regard to their EE systems. This complexity is not only caused by innovations, which are being pr...
Thomas Weber
ITCC
2005
IEEE
15 years 10 months ago
A Lightweight Authentication Protocol for Mobile Ad Hoc Networks
The characteristics of mobile ad hoc networks (MANETs) determine that the authentication approaches to protect routing and data packet transmission in MANETs should be lightweight...
Bin Lu, Udo W. Pooch