Sciweavers

1687 search results - page 44 / 338
» Which pointer analysis should I use
Sort
View
AUSAI
2007
Springer
14 years 4 months ago
Automated Intelligent Abundance Analysis of Scallop Survey Video Footage
Underwater video is increasingly being pursued as a low impact alternative to traditional techniques (such as trawls and dredges) for determining abundance and size frequency of ta...
Rob Fearn, Raymond Williams, R. Mike Cameron-Jones...
TWC
2008
106views more  TWC 2008»
13 years 10 months ago
Analysis of Handoff Interference and Outage along Arbitrary Trajectories in Cellular Networks
We introduce a new system performance measure due to handoff called handoff interference, which characterizes the additional interference noise induced by the handoff process. The ...
A. Leu, B. Mark, S. Tang
SIGCOMM
1995
ACM
14 years 1 months ago
Performance Analysis of MD5
MD5 is an authentication algorithm proposed as the required implementation of the authentication option in IPv6. This paper presents an analysis of the speed at which MD5 can be i...
Joseph D. Touch
HICSS
2008
IEEE
89views Biometrics» more  HICSS 2008»
14 years 4 months ago
Multi-perspective Assessment of Scalability of IT-Enabled Networked Constellations
Networked constellations are often formed to provide commercial IT services by leveraging the Internet technology. The provision of IT services should remain scalable, meaning tha...
Zsófia Derzsi, Jaap Gordijn, Koen Kok
ESOP
2004
Springer
14 years 3 months ago
Resources, Concurrency, and Local Reasoning (Abstract)
t) Peter W. O’Hearn Queen Mary, University of London In the 1960s Dijkstra suggested that, in order to limit the complexity of potential process interactions, concurrent programs...
Peter W. O'Hearn