Sciweavers

798 search results - page 119 / 160
» Comparing the expressive power of access control models
Sort
View
DATE
2006
IEEE
108views Hardware» more  DATE 2006»
14 years 4 months ago
Scheduling under resource constraints using dis-equations
Scheduling is an important step in high-level synthesis (HLS). In our tool, we perform scheduling in two steps: coarse-grain scheduling, in which we take into account the whole co...
Hadda Cherroun, Alain Darte, Paul Feautrier
SMI
2010
IEEE
204views Image Analysis» more  SMI 2010»
13 years 8 months ago
Generalized PolyCube Trivariate Splines
Abstract—This paper develops a new trivariate hierarchical spline scheme for volumetric data representation. Unlike conventional spline formulations and techniques, our new frame...
Bo Li, Xin Li, Kexiang Wang, Hong Qin
FUN
2010
Springer
263views Algorithms» more  FUN 2010»
14 years 3 months ago
Fighting Censorship with Algorithms
In countries such as China or Iran where Internet censorship is prevalent, users usually rely on proxies or anonymizers to freely access the web. The obvious difficulty with this a...
Mohammad Mahdian
FROCOS
2005
Springer
14 years 3 months ago
Sociable Interfaces
Interface formalisms are able to model both the input requirements and the output behavior of system components; they support both bottom-up component-based design, and top-down de...
Luca de Alfaro, Leandro Dias da Silva, Marco Faell...
INFOCOM
2007
IEEE
14 years 4 months ago
Millimeter Wave WPAN: Cross-Layer Modeling and Multi-Hop Architecture
— The 7 GHz of unlicensed spectrum in the 60 GHz band offers the potential for multiGigabit indoor wireless personal area networking (WPAN). With recent advances in the speed of ...
Sumit Singh, Federico Ziliotto, Upamanyu Madhow, E...