Sciweavers

1650 search results - page 166 / 330
» The HOM problem is decidable
Sort
View
ISW
2004
Springer
15 years 9 months ago
The Obfuscation Executive
Abstract. Code obfuscations are semantics-preserving code transformations used to protect a program from reverse engineering. There is generally no expectation of complete, long-te...
Kelly Heffner, Christian S. Collberg
MDAI
2004
Springer
15 years 9 months ago
Fuzzy Qualitative Models to Evaluate the Quality on the Web
The problem of finding quality information and services on the Web is analyzed. We present two user-centered evaluation methodologies to characterize the quality of the Web docume...
Enrique Herrera-Viedma
MWCN
2004
Springer
15 years 9 months ago
The Receiver's Dilemma
In Mobile Ad Hoc Networks (MANETs), each node has the capacity to act as a router. The performance of the MANET relies on how well the nodes perform this function. In simulations,...
John P. Mullen, Timothy Matis, Smriti Rangan
SAMOS
2004
Springer
15 years 9 months ago
Modeling Loop Unrolling: Approaches and Open Issues
Abstract. Loop unrolling plays an important role in compilation for Reconfigurable Processing Units (RPUs) as it exposes operator parallelism and enables other transformations (e.g...
João M. P. Cardoso, Pedro C. Diniz
ACSC
2003
IEEE
15 years 9 months ago
Policies for Sharing Distributed Probabilistic Beliefs
In this paper, we present several general policies for deciding when to share probabilistic beliefs between agents for distributed monitoring. In order to evaluate these policies,...
Christopher Leckie, Kotagiri Ramamohanarao