Sciweavers

3202 search results - page 463 / 641
» Memory access scheduling
Sort
View
CRYPTO
2005
Springer
103views Cryptology» more  CRYPTO 2005»
14 years 1 months ago
Pebbling and Proofs of Work
We investigate methods for providing easy-to-check proofs of computational effort. Originally intended for discouraging spam, the concept has wide applicability as a method for co...
Cynthia Dwork, Moni Naor, Hoeteck Wee
DIGRA
2005
Springer
14 years 1 months ago
Immersion in Game Atmospheres for the Video Game Heritage Preservation
The video game heritage is being preserved especially on the Web: comments, screenshots, sounds, videos, etc. But one important element is missing: the environment in which we pla...
Nicolas Esposito
LCPC
2005
Springer
14 years 1 months ago
Concurrency Analysis for Parallel Programs with Textually Aligned Barriers
Abstract. A fundamental problem in the analysis of parallel programs is to determine when two statements in a program may run concurrently. This analysis is the parallel analog to ...
Amir Kamil, Katherine A. Yelick
PASTE
2004
ACM
14 years 1 months ago
Validation of assembler programs for DSPs: a static analyzer
Digital Signal Processors are widely used in critical embedded systems to pilot low-level, often critical functionalities. We describe a static analyzer based on abstract interpre...
Matthieu Martel
OTM
2004
Springer
14 years 1 months ago
A Context-Based Awareness Mechanism for Mobile Cooperative Users
This paper presents a context-based awareness mechanism designed for users who access web-based collaborative systems using mobile devices. The limited capabilities of such devices...
Manuele Kirsch-Pinheiro, Marlène Villanova-...