Sciweavers

591 search results - page 100 / 119
» Implementing Joins Using Extensible Pattern Matching
Sort
View
DATE
1998
IEEE
92views Hardware» more  DATE 1998»
13 years 11 months ago
Multiple Behavior Module Synthesis Based on Selective Groupings
In this paper, we present an approach to synthesize multiple behavior modules. Given n DFGs to be implemented, the previous methods scheduled each of them sequentially, and implem...
Ju Hwan Yi, Hoon Choi, In-Cheol Park, Seung Ho Hwa...
CASCON
2008
137views Education» more  CASCON 2008»
13 years 8 months ago
Automating SLA modeling
Service Level Agreements (SLAs) define the level of service that a service provider must deliver. An SLA is a contract between service provider and consumer, and includes appropri...
Tony Chau, Vinod Muthusamy, Hans-Arno Jacobsen, El...
ICDAR
2003
IEEE
14 years 21 days ago
A Fast Multifunctional Approach for Document Image Analysis
Collinear arrangement of objects (such as, text elements or continuous lines) is integral part of any office document image, whether structured or unstructured. The ability to ana...
Abhishek Gattani, Maitrayee Mukerji, Hareish Gu
SIGOPS
2008
123views more  SIGOPS 2008»
13 years 7 months ago
Comparative evaluation of overlap strategies with study of I/O overlap in MPI-IO
Many scientific applications use parallel I/O to meet the low latency and high bandwidth I/O requirement. Among many available parallel I/O operations, collective I/O is one of th...
Christina M. Patrick, Seung Woo Son, Mahmut T. Kan...
SEKE
2010
Springer
13 years 5 months ago
A String Constraint Solver for Detecting Web Application Vulnerability
Given the bytecode of a software system, is it possible to automatically generate attack signatures that reveal its vulnerabilities? A natural solution would be symbolically execu...
Xiang Fu, Chung-Chih Li