Sciweavers

1114 search results - page 50 / 223
» Validating optimizations of concurrent C C programs
Sort
View
USENIX
2003
13 years 10 months ago
NCryptfs: A Secure and Convenient Cryptographic File System
Often, increased security comes at the expense of user convenience, performance, or compatibility with other systems. The right level of security depends on specific site and use...
Charles P. Wright, Michael C. Martino, Erez Zadok
FOCM
2007
94views more  FOCM 2007»
13 years 8 months ago
Trust-Region Methods on Riemannian Manifolds
A general scheme for trust-region methods on Riemannian manifolds is proposed and analyzed. Among the various approaches available to (approximately) solve the trust-region subpro...
Pierre-Antoine Absil, C. G. Baker, Kyle A. Galliva...
ICCS
2007
Springer
14 years 3 months ago
On the Virtues of Generic Programming for Symbolic Computation
The purpose of this study is to measure the impact of C level code polynomial arithmetic on the performances of AXIOM highlevel algorithms, such as polynomial factorization. More p...
Xin Li, Marc Moreno Maza, Éric Schost
MM
1995
ACM
89views Multimedia» more  MM 1995»
14 years 14 days ago
A Resolution Independent Video Language
As common as video processing is, programmers still implement video programs as manipulations of arrays of pixels. This paper presents a language extension called Rivl (pronounced...
Jonathan Swartz, Brian C. Smith
SIGCOMM
2010
ACM
13 years 9 months ago
Contrabass: concurrent transmissions without coordination
A PHY and MAC protocol for MIMO concurrent transmissions, called Contrabass, is presented. Concurrent transmissions, also referred to as multi-user MIMO, are simultaneous transmis...
Sungro Yoon