Sciweavers

1997 search results - page 289 / 400
» The importance of being biased
Sort
View
GIS
2010
ACM
13 years 8 months ago
Geolocation privacy and application platforms
Security and privacy issues for Location-Based Services (LBS) and geolocation-capable applications often revolve around designing a User Interface (UI) such that users are informe...
Nick Doty, Erik Wilde
ICTAI
2010
IEEE
13 years 8 months ago
Revision Rules in the Theory of Evidence
Abstract--Combination rules proposed so far in the DempsterShafer theory of evidence, especially Dempster rule, rely on a basic assumption, that is, pieces of evidence being combin...
Jianbing Ma, Weiru Liu, Didier Dubois, Henri Prade
IPPS
2010
IEEE
13 years 8 months ago
MMT: Exploiting fine-grained parallelism in dynamic memory management
Dynamic memory management is one of the most expensive but ubiquitous operations in many C/C++ applications. Additional features such as security checks, while desirable, further w...
Devesh Tiwari, Sanghoon Lee, James Tuck, Yan Solih...
ISLPED
2010
ACM
128views Hardware» more  ISLPED 2010»
13 years 8 months ago
Rank-aware cache replacement and write buffering to improve DRAM energy efficiency
DRAM power and energy efficiency considerations are becoming increasingly important for low-power and mobile systems. Using lower power modes provided by commodity DRAM chips redu...
Ahmed M. Amin, Zeshan Chishti
SAFECOMP
2010
Springer
13 years 8 months ago
Experiences in Applying Formal Verification in Robotics
Formal verification efforts in the area of robotics are still comparatively scarce. In this paper we report on our experiences with one such effort, which was concerned with design...
Dennis Walter, Holger Täubig, Christoph L&uum...