Sciweavers

956 search results - page 126 / 192
» Slicing Objects Using System Dependence Graphs
Sort
View
MICRO
1998
IEEE
89views Hardware» more  MICRO 1998»
14 years 2 months ago
Load Latency Tolerance in Dynamically Scheduled Processors
This paper provides quantitative measurements of load latency tolerance in a dynamically scheduled processor. To determine the latency tolerance of each memory load operation, our...
Srikanth T. Srinivasan, Alvin R. Lebeck
TROB
2008
159views more  TROB 2008»
13 years 10 months ago
Distributed Connectivity Control of Mobile Networks
Control of mobile networks raises fundamental and novel problems in controlling the structure of the resulting dynamic graphs. In particular, in applications involving mobile senso...
Michael M. Zavlanos, George J. Pappas
DBSEC
2009
163views Database» more  DBSEC 2009»
13 years 11 months ago
A Trust-Based Access Control Model for Pervasive Computing Applications
With the rapid growth in wireless networks and sensor and mobile devices, we are moving towards an era of pervasive computing. Access control is challenging in these environments. ...
Manachai Toahchoodee, Ramadan Abdunabi, Indrakshi ...
CIMCA
2008
IEEE
14 years 4 months ago
A Clustering Based Denoising Technique for Range Images of Time of Flight Cameras
A relatively new technique for measuring the 3D structure of visual scenes is provided by time of flight (TOF) cameras. Reflections of modulated light waves are recorded by a pa...
Holger Schöner, Bernhard Moser, Adrian A. Dor...
TOPLAS
2002
98views more  TOPLAS 2002»
13 years 9 months ago
Data abstraction and information hiding
traction and information hiding K. RUSTAN M. LEINO and GREG NELSON Compaq Systems Research Center er describes an approach for verifying programs in the presence of data abstractio...
K. Rustan M. Leino, Greg Nelson