Now showing items 10-12 of 104

    • Modeling Information Flow in Face-to-Face Meetings while Protecting Privacy 

      Rudolph, Larry; Zhenghao, Chen (2006-01)
      Social networks have been used to understand how information flows through an organization as well as identifying individuals that appear to have control over this information flow. Such individuals are identified as being ...
    • Programming with Exceptions in JCilk 

      Danaher, John S.; Lee, I-Ting Angelina; Leiserson, Charles E. (2006-01)
      JCilk extends the Java language to provide call-return semantics for multithreading, much as Cilk does for C. Java's built-in thread model does not support the passing of exceptions or return values from one thread back ...
    • MPEG-2 in a Stream Programming Language 

      Drake, Matthew; Hoffmann, Hank; Rabbah, Rodric; Amarasinghe, Saman P. (2006-01)
      Image and video codecs are prevalent in multimedia applications, ranging from embedded systems, to desktop computers, to high-end servers such as HDTV editing consoles. It is not uncommon however for developers create (from ...