Sciweavers

1821 search results - page 69 / 365
» Security-Aware Program Transformations
Sort
View
ICS
2009
Tsinghua U.
14 years 3 months ago
Computer generation of fast fourier transforms for the cell broadband engine
The Cell BE is a multicore processor with eight vector accelerators (called SPEs) that implement explicit cache management through direct memory access engines. While the Cell has...
Srinivas Chellappa, Franz Franchetti, Markus P&uum...
COMPSAC
2008
IEEE
14 years 3 months ago
Modeling by Form Transformation for End-User Initiative Development
2. Previous studies on end-user computing The development of Web applications should be supported by business professionals themselves since Web applications must be modified frequ...
Takeshi Chusho, Noriyuki Yagi
SIAMIS
2008
116views more  SIAMIS 2008»
13 years 8 months ago
Quantitative Object Reconstruction Using Abel Transform X-Ray Tomography and Mixed Variable Optimization
This paper introduces a new approach to the problem of quantitative reconstruction of an object from few radiographic views. A mixed variable programming problem is formulated in ...
Mark A. Abramson, Thomas J. Asaki, J. E. Dennis, K...
CASES
2010
ACM
13 years 7 months ago
Instruction selection by graph transformation
Common generated instruction selections are based on tree pattern matching, but modern and custom architectures feature instructions, which cannot be covered by trees. To overcome...
Sebastian Buchwald, Andreas Zwinkau
CSMR
1998
IEEE
14 years 1 months ago
The Extract-Transform-Rewrite Cycle. A Step towards MetaCARE
A conceptual reengineering framework is presented that proposes extract, transform and rewrite as three characteristic steps to be performed within a reengineering cycle. The cycl...
Jürgen Ebert, Bernt Kullbach, Andreas Panse