Sciweavers

962 search results - page 142 / 193
» Some Reducibilities on Regular Sets
Sort
View
ICCAD
2005
IEEE
106views Hardware» more  ICCAD 2005»
14 years 7 months ago
New decompilation techniques for binary-level co-processor generation
—Existing ASIPs (application-specific instruction-set processors) and compiler-based co-processor synthesis approaches meet the increasing performance requirements of embedded ap...
Greg Stiff, Frank Vahid
SAC
2009
ACM
14 years 4 months ago
Exploiting weak dependencies in tree-based search
In this work, our objective is to heuristically discover a simplified form of functional dependencies between variables called weak dependencies. Once discovered, these relations...
Alejandro Arbelaez, Youssef Hamadi
CCS
2009
ACM
14 years 4 months ago
Physically restricted authentication with trusted hardware
Modern computer systems permit users to access protected information from remote locations. In certain secure environments, it would be desirable to restrict this access to a part...
Michael S. Kirkpatrick, Elisa Bertino
RTCSA
2009
IEEE
14 years 4 months ago
Bounding the Maximum Length of Non-preemptive Regions under Fixed Priority Scheduling
The question whether preemptive systems are better than non-preemptive systems has been debated for a long time, but only partial answers have been provided in the real-time liter...
Gang Yao, Giorgio C. Buttazzo, Marko Bertogna
ICRA
2009
IEEE
170views Robotics» more  ICRA 2009»
14 years 4 months ago
Surface model reconstruction of 3D objects from multiple views
— A points surface reconstruction algorithm of 3D object models from multiple silhouettes is proposed in this paper. Some images of the target object are taken from a circular tr...
Vincenzo Lippiello, Fabio Ruggiero