Sciweavers

1711 search results - page 120 / 343
» Completing pseudojump operators
Sort
View
DCOSS
2011
Springer
12 years 7 months ago
Type-safe updating for modular WSN software
—Modular software, in which strongly-separated units of functionality can be independently added to and removed from a node’s running software, offers a promising approach to e...
Barry Porter, Utz Roedig, Geoff Coulson
CVPR
2012
IEEE
11 years 10 months ago
Random walks based multi-image segmentation: Quasiconvexity results and GPU-based solutions
We recast the Cosegmentation problem using Random Walker (RW) segmentation as the core segmentation algorithm, rather than the traditional MRF approach adopted in the literature s...
Maxwell D. Collins, Jia Xu, Leo Grady, Vikas Singh
ISLPED
1996
ACM
68views Hardware» more  ISLPED 1996»
14 years 6 days ago
Energy-recovery CMOS for highly pipelined DSP designs
We compare the frequency-versus-power dissipation performance of two energy-recovery CMOS implementations to that of a conventional, supply-voltage-scaled design. The application ...
William C. Athas, W.-C. Liu, Lars J. Svensson
ASM
2010
ASM
13 years 10 months ago
Applying the B Method for the Rigorous Development of Smart Card Applications
Abstract. Smart Card applications usually require reliability and security to avoid incorrect operation or access violation in transactions and corruption or undue access to stored...
Bruno Emerson Gurgel Gomes, David Déharbe, ...
JFPLC
1998
13 years 9 months ago
DF - a feature constraint system and its extension to a logic concurrent language
Abstract. This paper presents a feature constraint system that, compared with the well-known systems OSF 1] and CFT 5], incorporates several interesting characteristics. The new sy...
Liviu-Virgil Ciortuz