Sciweavers

2487 search results - page 113 / 498
» cases 2009
Sort
View
95
Voted
CASES
2009
ACM
15 years 7 months ago
Tight WCRT analysis of synchronous C programs
Accurate estimation of the tick length of a synchronous program is essential for efficient and predictable implementations that are devoid of timing faults. The techniques to dete...
Partha S. Roop, Sidharta Andalam, Reinhard von Han...
ICDT
2009
ACM
119views Database» more  ICDT 2009»
16 years 1 months ago
Incremental XPath evaluation
We study the problem of incrementally maintaining an XPath query on an XML database under updates. The updates we consider are node insertion, node deletion, and node relabeling. ...
Henrik Björklund, Marcel Marquardt, Wim Marte...
SACRYPT
2009
Springer
212views Cryptology» more  SACRYPT 2009»
15 years 7 months ago
Compact McEliece Keys from Goppa Codes
The classical McEliece cryptosystem is built upon the class of Goppa codes, which remains secure to this date in contrast to many other families of codes but leads to very large pu...
Rafael Misoczki, Paulo S. L. M. Barreto
108
Voted
SSD
2009
Springer
91views Database» more  SSD 2009»
15 years 7 months ago
Semantic Trajectory Compression
In the light of rapidly growing repositories capturing the movement trajectories of people in spacetime, the need for trajectory compression becomes obvious. This paper argues for ...
Falko Schmid, Kai-Florian Richter, Patrick Laube
SPAA
2009
ACM
16 years 1 months ago
Speed scaling of processes with arbitrary speedup curves on a multiprocessor
We consider the setting of a multiprocessor where the speeds of the m processors can be individually scaled. Jobs arrive over time and have varying degrees of parallelizability. A...
Ho-Leung Chan, Jeff Edmonds, Kirk Pruhs