Sciweavers

463 search results - page 23 / 93
» Method Tailoring as Negotiation
Sort
View
SBACPAD
2007
IEEE
143views Hardware» more  SBACPAD 2007»
14 years 4 months ago
A Code Compression Method to Cope with Security Hardware Overheads
Code Compression has been used to alleviate the memory requirements as well as to improve performance and/or minimize energy consumption. On the other hand, implementing security ...
Eduardo Wanderley Netto, Romain Vaslin, Guy Gognia...
WCRE
2002
IEEE
14 years 2 months ago
Analysis of Virtual Method Invocation for Binary Translation
The University of Queensland Binary Translator (UQBT ) is a static binary translation framework that allows for the translation of binary, executable programs, from one architectu...
Jens Tröger, Cristina Cifuentes
ICC
2009
IEEE
130views Communications» more  ICC 2009»
13 years 7 months ago
User Profiling: A Method for Limited Feedback in OFDMA Systems
In the OFDMA downlink, obtaining Channel State Information (CSI) from users is necessary for the Base Station (BS) to optimize network performance by intelligently allocating resou...
Vinay R. Majjigi, Rajiv Agarwal, John M. Cioffi
ECCV
2008
Springer
14 years 11 months ago
Robust Multiple Structures Estimation with J-Linkage
This paper tackles the problem of fitting multiple instances of a model to data corrupted by noise and outliers. The proposed solution is based on random sampling and conceptual da...
Roberto Toldo, Andrea Fusiello
CONTEXT
2007
Springer
14 years 1 months ago
Using Context for the Extraction of Relational Views
The paper presents an approach for automatically extracting views from a relational database schema, based on the knowledge of the application domain. In order to achieve such resu...
Cristiana Bolchini, Elisa Quintarelli, Rosalba Ros...