Sciweavers

18209 search results - page 109 / 3642
» Some Remarks on the Paper
Sort
View
CPM
2005
Springer
101views Combinatorics» more  CPM 2005»
14 years 3 months ago
Succinct Suffix Arrays Based on Run-Length Encoding
A succinct full-text self-index is a data structure built on a text T = t1t2 . . . tn, which takes little space (ideally close to that of the compressed text), permits efficient se...
Veli Mäkinen, Gonzalo Navarro
DATE
2002
IEEE
130views Hardware» more  DATE 2002»
14 years 3 months ago
Assigning Program and Data Objects to Scratchpad for Energy Reduction
The number of embedded systems is increasing and a remarkable percentage is designed as mobile applications. For the latter, the energy consumption is a limiting factor because of...
Stefan Steinke, Lars Wehmeyer, Bo-Sik Lee, Peter M...
SAC
2010
ACM
14 years 5 months ago
Nudge: intermediaries' role in interdependent network security
ombiners for Software Hardening - Extended Abstract (Short Paper) Amir Herzberg and Haya Shulman (Bar Ilan University) The PUF Promise (Short Paper) Heike Busch and Miroslava Sotak...
Jens Grossklags, Svetlana Radosavac, Alvaro A. C&a...
CGI
2003
IEEE
14 years 3 months ago
"Nijimi" Rendering Algorithm for Creating Quality Black Ink Paintings
The paper presents an interactive painting system for generating high quality and artistic calligraphy characters and black ink paintings. The system is based on our original algo...
Qinglian Guo, Tosiyasu L. Kunii
ACSAC
2002
IEEE
14 years 3 months ago
Throttling Viruses: Restricting propagation to defeat malicious mobile code
Modern computer viruses spread incredibly quickly, far faster than human-mediated responses. This greatly increases the damage that they cause. This paper presents an approach to ...
Matthew M. Williamson