Sciweavers

1687 search results - page 229 / 338
» Which pointer analysis should I use
Sort
View
TWC
2010
14 years 11 months ago
Rex: A randomized EXclusive region based scheduling scheme for mmWave WPANs with directional antenna
Millimeter-wave (mmWave) transmissions are promising technologies for high data rate (multi-Gbps) Wireless Personal Area Networks (WPANs). In this paper, we first introduce the con...
Lin X. Cai, Lin Cai, Xuemin Shen, Jon W. Mark
VLUDS
2010
225views Visualization» more  VLUDS 2010»
14 years 11 months ago
Visualization in Human-Centered Virtual Factories
In a manufacturing system (MS), a wide range of human activities are applied in production processes. The human factor plays a core role and should be incorporated into the design...
Xiang Yang, Eduard Deines, Jan C. Aurich
CHES
2011
Springer
254views Cryptology» more  CHES 2011»
14 years 4 months ago
Extractors against Side-Channel Attacks: Weak or Strong?
Randomness extractors are important tools in cryptography. Their goal is to compress a high-entropy source into a more uniform output. Beyond their theoretical interest, they have ...
Marcel Medwed, François-Xavier Standaert
SIGMOD
2012
ACM
222views Database» more  SIGMOD 2012»
13 years 6 months ago
Tiresias: a demonstration of how-to queries
In this demo, we will present Tiresias, the first how-to query engine. How-to queries represent fundamental data analysis questions of the form: “How should the input change in...
Alexandra Meliou, Yisong Song, Dan Suciu
COMPSAC
2005
IEEE
15 years 10 months ago
Exception Handling in Coordination-Based Mobile Environments
Mobile agent systems have many attractive features including asynchrony, openness, dynamicity and anonymity, which makes them indispensable in designing complex modern application...
Alexei Iliasov, Alexander B. Romanovsky