Sciweavers

1056 search results - page 91 / 212
» Identifying and Exploiting Ultrametricity
Sort
View
MICRO
1999
IEEE
109views Hardware» more  MICRO 1999»
14 years 2 months ago
Compiler-Directed Dynamic Computation Reuse: Rationale and Initial Results
Recent studies on value locality reveal that many instructions are frequently executed with a small variety of inputs. This paper proposes an approach that integrates architecture...
Daniel A. Connors, Wen-mei W. Hwu
DMSN
2007
ACM
14 years 2 months ago
A graph-based approach to vehicle tracking in traffic camera video streams
Vehicle tracking has a wide variety of applications, from law enforcement to traffic planning and public safety. However, the image resolution of the videos available from most tr...
Hamid Haidarian Shahri, Galileo Namata, Saket Navl...
ESORICS
2006
Springer
14 years 1 months ago
SessionSafe: Implementing XSS Immune Session Handling
With the growing trend towards the use of web applications the danger posed by cross site scripting vulnerabilities gains severity. The most serious threats resulting from cross si...
Martin Johns
LCPC
1995
Springer
14 years 1 months ago
Compiler Architectures for Heterogeneous Systems
Heterogeneous parallel systems incorporate diverse models of parallelism within a single machine or across machines and are better suited for diverse applications 25, 43, 30]. Thes...
Kathryn S. McKinley, Sharad Singhai, Glen E. Weave...
LREC
2010
147views Education» more  LREC 2010»
13 years 11 months ago
Speaker Attribution in Cabinet Protocols
Historical cabinet protocols are a useful resource which enable historians to identify the opinions expressed by politicians on different subjects and at different points of time....
Josef Ruppenhofer, Caroline Sporleder, Fabian Shir...