Sciweavers

1821 search results - page 287 / 365
» Security-Aware Program Transformations
Sort
View
VLSISP
2011
231views Database» more  VLSISP 2011»
13 years 3 months ago
Loop Distribution and Fusion with Timing and Code Size Optimization
Loop distribution and loop fusion are two effective loop transformation techniques to optimize the execution of the programs in DSP applications. In this paper, we propose a new t...
Meilin Liu, Edwin Hsing-Mean Sha, Qingfeng Zhuge, ...
ENASE
2010
121views Hardware» more  ENASE 2010»
13 years 3 months ago
Generation Mechanisms in Graphical Template Language
Textual models in MDD typically are generated in their concrete syntax using a template based language. On the contrary, graphical models as a generated in abstract syntax and then...
Elina Kalnina, Audris Kalnins, Edgars Celms, Agris...
ICCV
2011
IEEE
12 years 9 months ago
Informative Feature Selection for Object Recognition via Sparse PCA
Bag-of-words (BoW) methods are a popular class of object recognition methods that use image features (e.g., SIFT) to form visual dictionaries and subsequent histogram vectors to r...
Nikhil Naikal, Allen Y. Yang, S. Shankar Sastry
IHI
2012
293views Healthcare» more  IHI 2012»
12 years 4 months ago
iCircos: visual analytics for translational bioinformatics
Translational bioinformatics increasingly involves the discovery of associations between molecular and phenotype information, with the goal of transforming those discoveries into ...
Suresh K. Bhavnani, Mamta Abbas, Vickie McMicken, ...
POPL
2008
ACM
14 years 9 months ago
Generating precise and concise procedure summaries
We present a framework for generating procedure summaries that are precise -- applying the summary in a given context yields the same result as re-analyzing the procedure in that ...
Greta Yorsh, Eran Yahav, Satish Chandra