Sciweavers

1770 search results - page 185 / 354
» Writing requirements in computer security
Sort
View
EMSOFT
2003
Springer
14 years 4 months ago
Generating Heap-Bounded Programs in a Functional Setting
Abstract. High-level programming languages offer significant expressivity but provide little or no guarantees about resource utilization. Resource-bounded languages provide stron...
Walid Taha, Stephan Ellner, Hongwei Xi
EUROPAR
2003
Springer
14 years 4 months ago
Improving Performance of Hypermatrix Cholesky Factorization
Abstract. This paper shows how a sparse hypermatrix Cholesky factorization can be improved. This is accomplished by means of efficient codes which operate on very small dense matri...
José R. Herrero, Juan J. Navarro
HIPS
1998
IEEE
14 years 3 months ago
Parallel and Distributed Programming with Pthreads and Rthreads
This paper describes Rthreads (Remote threads), a software distributed shared memory system that supports sharing of global variables on clusters of computers with physically dist...
Bernd Dreier, Markus Zahn, Theo Ungerer
AAAI
2007
14 years 1 months ago
Joint Inference in Information Extraction
The goal of information extraction is to extract database records from text or semi-structured sources. Traditionally, information extraction proceeds by first segmenting each ca...
Hoifung Poon, Pedro Domingos
DOCENG
2010
ACM
13 years 12 months ago
Glyph extraction from historic document images
This paper is about the reproduction of ancient texts with vectorised fonts. While for OCR only recognition rates count, a reproduction process does not necessarily require the re...
Lothar Meyer-Lerbs, Arne Schuldt, Björn Gottf...