Filters








55 Hits in 9.9 sec

Bridging AOP to SMP

Tiago Stein D'Agostini, Antônio Augusto Fröhlich
2005 Proceedings of the 2005 ACM symposium on Applied computing - SAC '05  
These rely on specific language tools that, today, cannot be deployed in conjunction, thus imposing limitations on the software development process.  ...  This preprocessor is able to parse the input program, execute eventual metaprograms, and output the resulting single-level program for further processing by an aspect weaver.  ...  SAC'05 March 13-17, 2005, Santa Fe, New Mexico, USA 2005 ACM 1-58113-964-0/05/0003?5.00..C++ programming language, and AspectC++ AOP language.  ... 
doi:10.1145/1066677.1067028 dblp:conf/sac/DAgostiniF05 fatcat:mwnzeqgp3jhk3gokyobslpaof4

Adaptation point analysis for computation migration/checkpointing

Yanqing Ji, Hai Jiang, Vipin Chaudhary
2005 Proceedings of the 2005 ACM symposium on Applied computing - SAC '05  
Finding the appropriate location of adaptation points for computation migration/checkpointing is critical since the distance between two consecutive adaptation points determines the migration/checkpointing  ...  This paper proposes a heuristic adaptation point placement algorithm to improve the computation migration/checkpointing schemes' performance in terms of sensitivity and flexibility.  ...  SAC'05, March 13-17, 2005, Santa Fe, New Mexico, USA.  ... 
doi:10.1145/1066677.1066847 dblp:conf/sac/JiJC05 fatcat:qyiup5nnwzeqdkwoedoed7nwqy

Finding saddle points using stability boundaries

Chandan K. Reddy, Hsiao-Dong Chiang
2005 Proceedings of the 2005 ACM symposium on Applied computing - SAC '05  
This paper primarily focusses on computing saddle points on potential energy surfaces.  ...  The task of finding saddle points on potential energy surfaces plays a crucial role in understanding the dynamics of a micro-molecule as well as in studying the folding pathways of macro-molecules like  ...  SAC'05 March 13-17, 2005, Santa Fe, New Mexico, USA Copyright 2005 ACM 1-58113-964-0/05/0003 ...$5.00.  ... 
doi:10.1145/1066677.1066729 dblp:conf/sac/ReddyC05 fatcat:j6nbknmiofb4neel4btcqgvoe4

Surface reconstruction using shadow profilometry

Christopher P Walker, Norbert Maerz, Michael G Hilgers
2005 Proceedings of the 2005 ACM symposium on Applied computing - SAC '05  
The underlying concept is to reconstruct the exterior surfaces of object fragments that failed under load or were torn apart because of explosive forces.  ...  The surface reconstruction technique must be sufficiently accurate to capture detailed characteristics of small samples for identification and classification of the object under examination.  ...  SAC'05, March 13-17, 2005, Santa Fe, New Mexico, USA Copyright 2005 ACM 1-58113-964-0/05/0003...$5.Constructed Captured Image  ... 
doi:10.1145/1066677.1066958 dblp:conf/sac/WalkerMH05 fatcat:m6c27lgjwrf4nh4xrj6k4miexa

LighTS

Gian Pietro Picco, Davide Balzarotti, Paolo Costa
2005 Proceedings of the 2005 ACM symposium on Applied computing - SAC '05  
Moreover, some researchers also applied it in the challenging scenarios involving mobility and more specifically context-aware computing.  ...  On one hand, many of the available systems provide a wealth of features, which make the resulting implementation unnecessarily bloated and incompatible with the tight resource constraints typical of this  ...  The work described in this paper was partially supported by the Italian Ministry of Education, University, and Research (MIUR) under the VICOM project, and by the National Research Council (CNR) under  ... 
doi:10.1145/1066677.1066775 dblp:conf/sac/PiccoBC05 fatcat:4fecvohgkreqndlwaxaab6qr7e

Synthesis of C++ software for automated teller from CSPm specifications

Stephen Doxsee, W. B. Gardner
2005 Proceedings of the 2005 ACM symposium on Applied computing - SAC '05  
The translator has now been enhanced to accept input in CSPm syntax, the same dialect processed by the commercial verification tool, FDR2, and we demonstrate this with a new ATM case study.  ...  CSP++ is an object-oriented application framework for execution of CSP specifications that have been automatically translated into C++ source code by a tool called cspt.  ...  CONCLUSIONS We presented a new front-end to the CSP++ translator that supports CSPm syntax and demonstrated it using an ATM case study.  ... 
doi:10.1145/1066677.1067029 dblp:conf/sac/DoxseeG05 fatcat:ymrlxca35nhvnonvju7uxehe2q

Solving linear and one-way constraints for web document layout

Hiroshi Hosobe
2005 Proceedings of the 2005 ACM symposium on Applied computing - SAC '05  
The development of information systems such as Web browsers based on open standards is becoming more and more important.  ...  To tackle this problem, we propose a new algorithm called DuPlex that solves hybrid systems of linear constraints and one-way constraints.  ...  SAC'05 March 13-17, 2005, Santa Fe, New Mexico, USA Copyright 2005 ACM 1-58113-964-0/05/0003 ...$5.00. Figure 1 : 1 Text layout examples in a Web browser.  ... 
doi:10.1145/1066677.1066959 dblp:conf/sac/Hosobe05 fatcat:cjr3pxgt7zbhti7srvlibutlim

Efficient placement and routing in grid-based networks

Roozbeh Jafari, Foad Dabiri, Bo-Kyung Choi, Majid Sarrafzadeh
2005 Proceedings of the 2005 ACM symposium on Applied computing - SAC '05  
This ensures that the solution is a lower bound for both problems. We evaluate the effectiveness of our proposed techniques on a variety of benchmarks.  ...  Our system requires an extremely high level of robustness and efficient power optimization techniques. By modeling the faults, we evaluate the probability of having failures in network.  ...  Figure 1 : 1 Interconnection Topology SAC' 05 , 05 March 13-17, 2005, Santa Fe, New Mexico, USA.  ... 
doi:10.1145/1066677.1066882 dblp:conf/sac/JafariDCS05 fatcat:b6oez7wbtzbf5as4fuk24dfwmq

Avoiding data conversions in embedded media processors

Ben Juurlink, Asadollah Shahbahrami, Stamatis Vassiliadis
2005 Proceedings of the 2005 ACM symposium on Applied computing - SAC '05  
It is shown that in most emulations there is a potential performance improvement, making the proposed scheme suitable for embedded processors with a limited hardware budget.  ...  , March 13-17, 2005, Santa Fe, New Mexico, USA.  ...  Copyright 2005 ACM 1-58113-964-0/05/0003...$5.00. + + + + each section is 12 bit 24-bit 24-bit 24-bit fsum12 + + 48-bit 48-bit fsum24 fsum48 + 96-bit 24-bit Table 1 : 1  ... 
doi:10.1145/1066677.1066883 dblp:conf/sac/JuurlinkSV05 fatcat:eyjs2vtwqrd3jbfbki5wabfhvy

Efficient mass decomposition

Sebastian Böcker, Zsuzsanna Lipták
2005 Proceedings of the 2005 ACM symposium on Applied computing - SAC '05  
Our simulations show that the algorithm presented performs well on relevant applications.  ...  To the best of our knowledge, this is the first algorithm for the problem with runtime independent of the size of the query M .  ...  The authors are currently supported by the "Deutsche Forschungsgemeinschaft" (BO 1910/1-1 and 1-2) within the Computer Science Action Program.  ... 
doi:10.1145/1066677.1066715 dblp:conf/sac/BockerL05 fatcat:csp5sjcexnhunjc2otazpzucoi

Armed E-Bunny

Mourad Debbabi, Azzam Mourad, Nadia Tawbi
2005 Proceedings of the 2005 ACM symposium on Applied computing - SAC '05  
The experimental results on its performance demonstrate that a speedup of 360% over the last version of Sun's KVM is accomplished with a footprint overhead that does not exceed 119KB.  ...  The primary objective of our work is to come up with an efficient, lightweight and low-footprint accelerated Java virtual machine ready to be executed on embedded machines.  ...  SAC'05 March 13-17, 2005, Santa Fe, New Mexico, USA Copyright 2005 ACM 1-58113-964-0/05/0003 ...$5.00.  ... 
doi:10.1145/1066677.1066876 dblp:conf/sac/DebbabiMT05 fatcat:vmtcpdlcp5a2bcocxatlywzt7m

Automatic extraction of informative blocks from webpages

Sandip Debnath, Prasenjit Mitra, C. Lee Giles
2005 Proceedings of the 2005 ACM symposium on Applied computing - SAC '05  
While operating on several thousand webpages obtained from 11 news websites, our algorithms significantly outperform the Entropy-based algorithm proposed by Lin and Ho [7] in both accuracy and run-time  ...  The algorithms identify primary content blocks by i) looking for blocks that do not occur a large number of times across webpages and ii) looking for blocks with desired features respectively.  ...  The ContentExtractor algorithm detects redundant blocks based on the occurrence of the same SAC'05 March 13-17, 2005, Santa Fe, New Mexico, USA Copyright 2005 ACM 1-58113-964-0/05/0003 ...$5.00.  ... 
doi:10.1145/1066677.1067065 dblp:conf/sac/DebnathMG05 fatcat:iflvvavabvctdjk2mkcusp277y

Compiling regular patterns to sequential machines

Burak Emir
2005 Proceedings of the 2005 ACM symposium on Applied computing - SAC '05  
Variables in patterns allow one to refer to parts of the matching input. But some regular patterns suffer from inherent ambiguity, yielding more than one valid result.  ...  Applying the match policy optimally yields two deterministic sequential machines, which produce the shortest match in two consecutive runs.  ...  I thank Vladimir Gapeyev, Alain Frisch and Sebastian Maneth for discussions on regular pattern matching.  ... 
doi:10.1145/1066677.1066992 dblp:conf/sac/Emir05 fatcat:btj52ok3bnef7ch6btaywqizau

Privacy preserving learning in negotiation

Sheng Zhang, Fillia Makedon
2005 Proceedings of the 2005 ACM symposium on Applied computing - SAC '05  
to securely complete the learning process on a union of distributed data sets.  ...  To get more accurate and satisfactory learning results, negotiation parties have the desire to employ learning techniques on the union of their past negotiation records.  ...  SAC'05 March 13-17, 2005, Santa Fe, New Mexico, USA Copyright 2005 ACM 1-58113-964-0/05/0003 ...$5.00.  ... 
doi:10.1145/1066677.1066865 dblp:conf/sac/ZhangM05 fatcat:dmatxilldfgp5b2a5zgzo3mprq

Honeynet based distributed adaptive network forensics and active real time investigation

Wei Ren, Hai Jin
2005 Proceedings of the 2005 ACM symposium on Applied computing - SAC '05  
Network forensics and honeynet systems have the same features of collecting information about the computer misuses.  ...  Honeynet system can lure attackers and gain information about new types of intrusions. Network forensics system can analysis and reconstruct the attack behaviors.  ...  To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. SAC'05, March 13-17, 2005, Santa Fe, New Mexico, USA.  ... 
doi:10.1145/1066677.1066749 dblp:conf/sac/RenJ05 fatcat:3xkaedhlgzajbkzyjrkad2wtd4
« Previous Showing results 1 — 15 out of 55 results