Sciweavers

3987 search results - page 771 / 798
» Ontology-Based Model Transformation
Sort
View
CC
2010
Springer
190views System Software» more  CC 2010»
14 years 4 months ago
Is Reuse Distance Applicable to Data Locality Analysis on Chip Multiprocessors?
On Chip Multiprocessors (CMP), it is common that multiple cores share certain levels of cache. The sharing increases the contention in cache and memory-to-chip bandwidth, further h...
Yunlian Jiang, Eddy Z. Zhang, Kai Tian, Xipeng She...
ISBI
2009
IEEE
14 years 4 months ago
Posture Matching and Elastic Registration of a Mouse Atlas to Surface Topography Range Data
Estimation of internal mouse anatomy is required for quantitative bioluminescence or fluorescence tomography. However, only surface range data can be recovered from all-optical s...
Anand Joshi, Abhijit Chaudhari, Changqing Li, Davi...
CTRSA
2009
Springer
151views Cryptology» more  CTRSA 2009»
14 years 4 months ago
Key-Private Proxy Re-encryption
Proxy re-encryption (PRE) allows a proxy to convert a ciphertext encrypted under one key into an encryption of the same message under another key. The main idea is to place as lit...
Giuseppe Ateniese, Karyn Benson, Susan Hohenberger
LCTRTS
2009
Springer
14 years 4 months ago
Synergistic execution of stream programs on multicores with accelerators
The StreamIt programming model has been proposed to exploit parallelism in streaming applications on general purpose multicore architectures. The StreamIt graphs describe task, da...
Abhishek Udupa, R. Govindarajan, Matthew J. Thazhu...
ICDAR
2009
IEEE
14 years 4 months ago
Text Lines and Snippets Extraction for 19th Century Handwriting Documents Layout Analysis
In this paper we propose a new approach to improve electronic editions of human science corpus, providing an efficient estimation of manuscripts pages structure. In any handwriti...
Vincent Malleron, Véronique Eglin, Hubert E...