Sciweavers

4022 search results - page 734 / 805
» Adaptive Sweeping Techniques
Sort
View
CRYPTO
1987
Springer
87views Cryptology» more  CRYPTO 1987»
14 years 1 months ago
How to Make Replicated Data Secure
Many distributed systems manage some form of long-lived data, such as files or data bases. The performance and fault-tolerance of such systems may be enhanced if the repositories ...
Maurice Herlihy, J. D. Tygar
CODES
2009
IEEE
14 years 1 months ago
An MDP-based application oriented optimal policy for wireless sensor networks
Technological advancements due to Moore’s law have led to the proliferation of complex wireless sensor network (WSN) domains. One commonality across all WSN domains is the need ...
Arslan Munir, Ann Gordon-Ross
ECCV
2006
Springer
13 years 12 months ago
Spatial Intensity Correction of Fluorescent Confocal Laser Scanning Microscope Images
Abstract. This paper addresses the problem of intensity correction of fluorescent confocal laser scanning microscope (CLSM) images. CLSM images are frequently used in medical domai...
Sang-Chul Lee, Peter Bajcsy
CP
2008
Springer
13 years 11 months ago
An Application of Constraint Programming to Superblock Instruction Scheduling
Modern computer architectures have complex features that can only be fully taken advantage of if the compiler schedules the compiled code. A standard region of code for scheduling ...
Abid M. Malik, Michael Chase, Tyrel Russell, Peter...
EDM
2010
170views Data Mining» more  EDM 2010»
13 years 11 months ago
Online Curriculum Planning Behavior of Teachers
Curriculum planning is perhaps one of the most important tasks teachers must perform before instruction. While this task is facilitated by a wealth of existing online tools and res...
Keith E. Maull, Manuel Gerardo Saldivar, Tamara Su...