Sciweavers

203 search results - page 18 / 41
» Making Computer Programming Fun and Accessible
Sort
View
POPL
2004
ACM
14 years 10 months ago
Asynchronous and deterministic objects
We present in this article a precise security model for data confidentiality in the framework of asynchronous and deterministic objects. Our underlying programming model is based ...
Denis Caromel, Ludovic Henrio, Bernard P. Serpette
IPSN
2007
Springer
14 years 4 months ago
Building a sensor network of mobile phones
Mobile phones have two sensors: a camera and a microphone. The widespread and ubiquitous nature of mobile phones around the world makes it attractive to build a large-scale sensor...
Aman Kansal, Michel Goraczko, Feng Zhao
BILDMED
2006
163views Algorithms» more  BILDMED 2006»
13 years 11 months ago
CLARET: A Tool for Fully Automated Evaluation of MRSI with Pattern Recognition Methods
Abstract. Magnetic Resonance Spectroscopic Imaging (MRSI) measures relative concentrations of metabolites in vivo and can thus be used for the diagnosis of certain tumors. We intro...
B. Michael Kelm, Bjoern H. Menze, T. Neff, Christi...
ICS
2010
Tsinghua U.
14 years 2 months ago
Handling task dependencies under strided and aliased references
The emergence of multicore processors has increased the need for simple parallel programming models usable by nonexperts. The ability to specify subparts of a bigger data structur...
Josep M. Pérez, Rosa M. Badia, Jesús...
DAGSTUHL
2008
13 years 11 months ago
Extending the Range of C-XSC: Some Tools and Applications for the use in Parallel and other Environments
We present some examples of extensions for C-XSC that have been developed lately. Among these are extensions that give access to further hardware and software environments as well ...
Markus Grimmer