Sciweavers

1262 search results - page 82 / 253
» Generating instruction sets and microarchitectures from appl...
Sort
View
LCTRTS
2005
Springer
14 years 2 months ago
Cache aware optimization of stream programs
Effective use of the memory hierarchy is critical for achieving high performance on embedded systems. We focus on the class of streaming applications, which is increasingly preval...
Janis Sermulins, William Thies, Rodric M. Rabbah, ...
GECCO
2007
Springer
129views Optimization» more  GECCO 2007»
14 years 3 months ago
Procreating V-detectors for nonself recognition: an application to anomaly detection in power systems
The artificial immune system approach for self-nonself discrimination and its application to anomaly detection problems in engineering is showing great promise. A seminal contribu...
Min Gui, Sanjoy Das, Anil Pahwa
ISVC
2009
Springer
14 years 3 months ago
Weight, Sex, and Facial Expressions: On the Manipulation of Attributes in Generative 3D Face Models
Generative 3D Face Models are expressive models with applications in modelling and editing. They are learned from example faces, and offer a compact representation of the continuou...
Brian Amberg, Pascal Paysan, Thomas Vetter
ACSAC
2006
IEEE
14 years 1 months ago
Data Sandboxing: A Technique for Enforcing Confidentiality Policies
When an application reads private / sensitive information and subsequently communicates on an output channel such as a public file or a network connection, how can we ensure that ...
Tejas Khatiwala, Raj Swaminathan, V. N. Venkatakri...
BMCBI
2010
149views more  BMCBI 2010»
13 years 9 months ago
S3DB core: a framework for RDF generation and management in bioinformatics infrastructures
Background: Biomedical research is set to greatly benefit from the use of semantic web technologies in the design of computational infrastructure. However, beyond well defined res...
Jonas S. Almeida, Helena F. Deus, Wolfgang Maass