Sciweavers

948 search results - page 65 / 190
» What can we achieve by arbitrary announcements
Sort
View
ISCA
2008
IEEE
165views Hardware» more  ISCA 2008»
14 years 2 months ago
Using Hardware Memory Protection to Build a High-Performance, Strongly-Atomic Hybrid Transactional Memory
We demonstrate how fine-grained memory protection can be used in support of transactional memory systems: first showing how a software transactional memory system (STM) can be m...
Lee Baugh, Naveen Neelakantam, Craig B. Zilles
ACSAC
2006
IEEE
14 years 1 months ago
A Module System for Isolating Untrusted Software Extensions
With the recent advent of dynamically extensible software systems, in which software extensions may be dynamically loaded into the address space of a core application to augment i...
Philip W. L. Fong, Simon A. Orr
UPP
2004
Springer
14 years 1 months ago
From Prescriptive Programming of Solid-State Devices to Orchestrated Self-organisation of Informed Matter
Abstract. Achieving real-time response to complex, ambiguous, highbandwidth data is impractical with conventional programming. Only the narrow class of compressible input-output ma...
Klaus-Peter Zauner
GLOBECOM
2007
IEEE
14 years 2 months ago
Resource Allocation for Amplify-and-Forward Relay Networks with Differential Modulation
— The optimum resource allocation is an important method to improve the error performance and energy efficiency of wireless relay networks. In this paper, we consider the resour...
Woong Cho, Liuqing Yang
ACCV
2007
Springer
14 years 1 months ago
Shape from Contour for the Digitization of Curved Documents
Abstract. We are aiming at extending the basic digital camera functionalities to the ability to simulate the flattening of a document, by virtually acting like a flatbed scanner....
Frédéric Courteille, Jean-Denis Duro...