Sciweavers

3667 search results - page 525 / 734
» Software Rejuvenation - Modeling and Analysis
Sort
View
125
Voted
CC
1999
Springer
107views System Software» more  CC 1999»
15 years 7 months ago
Link-Time Improvement of Scheme Programs
Abstract. Optimizing compilers typically limit the scope of their analyses and optimizations to individual modules. This has two drawbacks: rst, library code cannot be optimized to...
Saumya K. Debray, Robert Muth, Scott A. Watterson
140
Voted
EUROMICRO
1998
IEEE
15 years 7 months ago
Image Compression Using the Wavelet Transform on Textural Regions of Interest
This paper suggests a new image compression scheme, using the discrete wavelet transformation (DWT), which is based on attempting to preserve the texturally important image charac...
Dimitris A. Karras, S. A. Karkanis, Basil G. Mertz...
131
Voted
EUROMICRO
1998
IEEE
15 years 7 months ago
The Latency Hiding Effectiveness of Decoupled Access/Execute Processors
Several studies have demonstrated that out-of-order execution processors may not be the most adequate organization for wide issue processors due to the increasing penalties that w...
Joan-Manuel Parcerisa, Antonio González
110
Voted
HICSS
1998
IEEE
176views Biometrics» more  HICSS 1998»
15 years 7 months ago
Intelligent System for Reading Handwriting on Forms
The National Institute of Standards and Technology (NIST) has developed a form-based handprint recognition system for reading information written on forms. This public domain soft...
Michael D. Garris
132
Voted
ICRE
1998
IEEE
15 years 7 months ago
Requirements Definition for Survivable Network Systems
Pervasive societal dependency on large-scale, unbounded network systems, the substantial risks of such dependency, and the growing sophistication of system intruders, have focused...
Richard C. Linger, Nancy R. Mead, Howard F. Lipson