Sciweavers

2572 search results - page 325 / 515
» codes 2008
Sort
View
ICST
2008
IEEE
15 years 11 months ago
Test-Driven Assessment of Access Control in Legacy Applications
If access control policy decision points are not neatly separated from the business logic of a system, the evolution of a security policy likely leads to the necessity of changing...
Yves Le Traon, Tejeddine Mouelhi, Alexander Pretsc...
IEEEPACT
2008
IEEE
15 years 10 months ago
Redundancy elimination revisited
This work proposes and evaluates improvements to previously known algorithms for redundancy elimination. Enhanced Scalar Replacement combines two classic techniques, scalar replac...
Keith D. Cooper, Jason Eckhardt, Ken Kennedy
IJCNN
2008
IEEE
15 years 10 months ago
Biologically realizable reward-modulated hebbian training for spiking neural networks
— Spiking neural networks have been shown capable of simulating sigmoidal artificial neural networks providing promising evidence that they too are universal function approximat...
Silvia Ferrari, Bhavesh Mehta, Gianluca Di Muro, A...
IPPS
2008
IEEE
15 years 10 months ago
Lattice Boltzmann simulation optimization on leading multicore platforms
We present an auto-tuning approach to optimize application performance on emerging multicore architectures. The methodology extends the idea of searchbased performance optimizatio...
Samuel Williams, Jonathan Carter, Leonid Oliker, J...
ISM
2008
IEEE
161views Multimedia» more  ISM 2008»
15 years 10 months ago
Deblocking of Block-Transform Compressed Images Using Phase-Adaptive Shifted Thresholding
Many popular image compression schemes are based on block-transform coding, a technique where images are broken into small blocks of pixels prior to transformation and compression...
Alexander Wong, William Bishop