Sciweavers

7264 search results - page 1269 / 1453
» A multiplicative up-propagation algorithm
Sort
View
ISSTA
2010
ACM
15 years 6 months ago
Exploiting program dependencies for scalable multiple-path symbolic execution
This paper presents a new technique, called Symbolic Program Decomposition (or SPD), for symbolic execution of multiple paths that is more scalable than existing techniques, which...
Raúl A. Santelices, Mary Jean Harrold
CHES
2008
Springer
132views Cryptology» more  CHES 2008»
15 years 6 months ago
Light-Weight Instruction Set Extensions for Bit-Sliced Cryptography
Bit-slicing is a non-conventional implementation technique for cryptographic software where an n-bit processor is considered as a collection of n 1-bit execution units operating in...
Philipp Grabher, Johann Großschädl, Dan...
CIKM
2008
Springer
15 years 6 months ago
Modeling and exploiting query interactions in database systems
The typical workload in a database system consists of a mixture of multiple queries of different types, running concurrently and interacting with each other. Hence, optimizing per...
Mumtaz Ahmad, Ashraf Aboulnaga, Shivnath Babu, Kam...
CIKM
2008
Springer
15 years 6 months ago
A system for finding biological entities that satisfy certain conditions from texts
Finding biological entities (such as genes or proteins) that satisfy certain conditions from texts is an important and challenging task in biomedical information retrieval and tex...
Wei Zhou, Clement T. Yu, Weiyi Meng
3DPVT
2006
IEEE
197views Visualization» more  3DPVT 2006»
15 years 6 months ago
Structured Light Based Reconstruction under Local Spatial Coherence Assumption
3D scanning techniques based on structured light usually achieve robustness against outliers by performing multiple projections to simplify correspondence. However, for cases such...
Hao Li, Raphael Straub, Hartmut Prautzsch
« Prev « First page 1269 / 1453 Last » Next »