Sciweavers

375 search results - page 23 / 75
» Implementation Alternatives for Bottom-Up Evaluation
Sort
View
ISCC
2000
IEEE
122views Communications» more  ISCC 2000»
15 years 8 months ago
Hierarchical Performance Modeling for Distributed System Architectures
Performance modeling and evaluation techniques are essential when designing and implementing distributed software systems. Constructing performance models for such systems can req...
Debra L. Smarkusky, Reda A. Ammar, Imad Antonios, ...
IPPS
1997
IEEE
15 years 8 months ago
Parallel Simulated Annealing: An Adaptive Approach
This paper analyses alternatives for the parallelization of the Simulated Annealing algorithm when applied to the placement of modules in a VLSI circuit considering the use of PVM...
Jonas Knopman, Júlio S. Aude
DIMVA
2010
15 years 6 months ago
Conqueror: Tamper-Proof Code Execution on Legacy Systems
We present Conqueror, a software-based attestation scheme for tamper-proof code execution on untrusted legacy systems. Beside providing load-time attestation of a piece of code, Co...
Lorenzo Martignoni, Roberto Paleari, Danilo Brusch...
ENTCS
2007
86views more  ENTCS 2007»
15 years 4 months ago
Tinycals: Step by Step Tacticals
Most of the state-of-the-art proof assistants are based on procedural proof languages, scripts, and rely on LCF tacticals as the primary tool for tactics composition. In this pape...
Claudio Sacerdoti Coen, Enrico Tassi, Stefano Zacc...
CG
2005
Springer
15 years 4 months ago
Hyper-Resolution: Image detail reconstruction through parametric edges
Hyper-Resolution, a new technique for super-resolution reconstruction of images, is based on matching lowresolution target image details to their high-resolution counterparts from...
Lijun Yin, Matt T. Yourst