Sciweavers

1809 search results - page 351 / 362
» Weakly Computable Real Numbers
Sort
View
EMSOFT
2009
Springer
14 years 20 days ago
Modular static scheduling of synchronous data-flow networks: an efficient symbolic representation
This paper addresses the question of producing modular sequential imperative code from synchronous data-flow networks. Precisely, given a system with several input and output flow...
Marc Pouzet, Pascal Raymond
CCS
2006
ACM
14 years 16 days ago
An effective defense against email spam laundering
Laundering email spam through open-proxies or compromised PCs is a widely-used trick to conceal real spam sources and reduce spamming cost in underground email spam industry. Spam...
Mengjun Xie, Heng Yin, Haining Wang
NGC
2000
Springer
14 years 11 days ago
The use of hop-limits to provide survivable ATM group communications
We examine the use of a hop-limit constraint with techniques to provide survivability for connection-oriented ATM group communications. A hop-limit constraint is an approach that ...
William Yurcik, David Tipper, Deep Medhi
ICIP
1997
IEEE
14 years 11 days ago
Object Based Video with Progressive Foreground
A novel algorithm is described for coding objects in video compression systems which gives complete control over the bit allocation to the video objects. The method is evaluated b...
Donald M. Monro, Huijuan Li, J. A. Nicholls
ICCBR
1995
Springer
14 years 11 days ago
Route Planning by Analogy
There have been several e orts to create and use real maps in computer applications that automatically nd good map routes. In general, online map representations do not include in...
Karen Zita Haigh, Manuela M. Veloso