Sciweavers

39 search results - page 3 / 8
» Exploiting Basic Block Value Locality with Block Reuse
Sort
View
ICCD
2004
IEEE
97views Hardware» more  ICCD 2004»
14 years 2 months ago
Runtime Execution Monitoring (REM) to Detect and Prevent Malicious Code Execution
1 Many computer security threats involve execution of unauthorized foreign code on the victim computer. Viruses, network and email worms, Trojan horses, backdoor programs used in ...
A. Murat Fiskiran, Ruby B. Lee
ICIP
2007
IEEE
14 years 7 months ago
Color Image Denoising via Sparse 3D Collaborative Filtering with Grouping Constraint in Luminance-Chrominance Space
We propose an effective color image denoising method that exploits ltering in highly sparse local 3D transform domain in each channel of a luminance-chrominance color space. For e...
Kostadin Dabov, Alessandro Foi, Vladimir Katkovnik...
ASPLOS
1992
ACM
13 years 9 months ago
Access Normalization: Loop Restructuring for NUMA Compilers
: In scalable parallel machines, processors can make local memory accesses much faster than they can make remote memory accesses. In addition, when a number of remote accesses must...
Wei Li, Keshav Pingali
IJHPCN
2008
94views more  IJHPCN 2008»
13 years 5 months ago
Analysing and improving clustering based sampling for microprocessor simulation
: We propose a set of statistical metrics for making a comprehensive, fair, and insightful evaluation of features, clustering algorithms, and distance measures in representative sa...
Yue Luo, Ajay Joshi, Aashish Phansalkar, Lizy Kuri...
ICCD
2005
IEEE
128views Hardware» more  ICCD 2005»
14 years 2 months ago
Automatic Synthesis of Composable Sequential Quantum Boolean Circuits
This paper presents a methodology to transfer self-timed circuit specifications into sequential quantum Boolean circuits (SQBCs) and composable SQBCs (CQBCs). State graphs (SGs) a...
Li-Kai Chang, Fu-Chiung Cheng