Sciweavers

1729 search results - page 242 / 346
» Deterministic Expressions in C
Sort
View
IEEEPACT
2008
IEEE
15 years 10 months ago
Exploiting loop-dependent stream reuse for stream processors
The memory access limits the performance of stream processors. By exploiting the reuse of data held in the Stream Register File (SRF), an on-chip storage, the number of memory acc...
Xuejun Yang, Ying Zhang, Jingling Xue, Ian Rogers,...
SCAM
2008
IEEE
15 years 10 months ago
From Indentation Shapes to Code Structures
In a previous study, we showed that indentation was regular across multiple languages and the variance in the level of indentation of a block of revised code is correlated with me...
Abram Hindle, Michael W. Godfrey, Richard C. Holt
VTC
2008
IEEE
153views Communications» more  VTC 2008»
15 years 10 months ago
Analytical Model for Message Propagation in Delay Tolerant Vehicular Ad Hoc Networks
–In this paper we present an analytical model for delay tolerant message propagation in a dynamic vehicular network. The analysis provides upper and lower bounds for message prop...
Ashish Agarwal, David Starobinski, Thomas D. C. Li...
WACV
2008
IEEE
15 years 10 months ago
Multi-Pose Face Detection with Asymmetric Haar Features
In this paper we present a system for multi-pose face detection. Our system presents three main contributions. First, we introduce the use of asymmetric Haar features. Asymmetric ...
Geovany A. Ramírez, Olac Fuentes
WETICE
2008
IEEE
15 years 10 months ago
Wolf - An Eclipse Plug-In for WADE
This paper describes WOLF, a development environment for WADE-based applications. WADE is a software platform, based on JADE, a popular Open Source framework, for the development ...
Giovanni Caire, Marisa Porta, Elena Quarantotto, G...