Sciweavers

1729 search results - page 242 / 346
» Deterministic Expressions in C
Sort
View
IEEEPACT
2008
IEEE
14 years 4 months ago
Exploiting loop-dependent stream reuse for stream processors
The memory access limits the performance of stream processors. By exploiting the reuse of data held in the Stream Register File (SRF), an on-chip storage, the number of memory acc...
Xuejun Yang, Ying Zhang, Jingling Xue, Ian Rogers,...
SCAM
2008
IEEE
14 years 4 months ago
From Indentation Shapes to Code Structures
In a previous study, we showed that indentation was regular across multiple languages and the variance in the level of indentation of a block of revised code is correlated with me...
Abram Hindle, Michael W. Godfrey, Richard C. Holt
VTC
2008
IEEE
153views Communications» more  VTC 2008»
14 years 4 months ago
Analytical Model for Message Propagation in Delay Tolerant Vehicular Ad Hoc Networks
–In this paper we present an analytical model for delay tolerant message propagation in a dynamic vehicular network. The analysis provides upper and lower bounds for message prop...
Ashish Agarwal, David Starobinski, Thomas D. C. Li...
WACV
2008
IEEE
14 years 4 months ago
Multi-Pose Face Detection with Asymmetric Haar Features
In this paper we present a system for multi-pose face detection. Our system presents three main contributions. First, we introduce the use of asymmetric Haar features. Asymmetric ...
Geovany A. Ramírez, Olac Fuentes
WETICE
2008
IEEE
14 years 4 months ago
Wolf - An Eclipse Plug-In for WADE
This paper describes WOLF, a development environment for WADE-based applications. WADE is a software platform, based on JADE, a popular Open Source framework, for the development ...
Giovanni Caire, Marisa Porta, Elena Quarantotto, G...