Sciweavers

297 search results - page 56 / 60
» Heap Reference Analysis Using Access Graphs
Sort
View
STOC
2004
ACM
157views Algorithms» more  STOC 2004»
14 years 11 months ago
Derandomizing homomorphism testing in general groups
The main result of this paper is a near-optimal derandomization of the affine homomorphism test of Blum, Luby and Rubinfeld (Journal of Computer and System Sciences, 1993). We sho...
Amir Shpilka, Avi Wigderson
JMM2
2007
212views more  JMM2 2007»
13 years 10 months ago
Flux Tensor Constrained Geodesic Active Contours with Sensor Fusion for Persistent Object Tracking
— This paper makes new contributions in motion detection, object segmentation and trajectory estimation to create a successful object tracking system. A new efficient motion det...
Filiz Bunyak, Kannappan Palaniappan, Sumit Kumar N...
FGCS
2007
160views more  FGCS 2007»
13 years 10 months ago
Distributed data mining in grid computing environments
The computing-intensive data mining for inherently Internet-wide distributed data, referred to as Distributed Data Mining (DDM), calls for the support of a powerful Grid with an e...
Ping Luo, Kevin Lü, Zhongzhi Shi, Qing He
BIRTHDAY
2011
Springer
12 years 10 months ago
Algorithmic Aspects of Risk Management
Abstract. Risk analysis has been used to manage the security of systems for several decades. However, its use has been limited to offline risk computation and manual response. In c...
Ashish Gehani, Lee Zaniewski, K. Subramani
ECRTS
2005
IEEE
14 years 4 months ago
Cache Contents Selection for Statically-Locked Instruction Caches: An Algorithm Comparison
Cache memories have been extensively used to bridge the gap between high speed processors and relatively slower main memories. However, they are sources of predictability problems...
Antonio Martí Campoy, Isabelle Puaut, Angel...