Sciweavers

7648 search results - page 1319 / 1530
» A Data Locality Optimizing Algorithm
Sort
View
CHES
2005
Springer
149views Cryptology» more  CHES 2005»
15 years 8 months ago
Resistance of Randomized Projective Coordinates Against Power Analysis
Embedded devices implementing cryptographic services are the result of a trade-off between cost, performance and security. Aside from flaws in the protocols and the algorithms us...
William Dupuy, Sébastien Kunz-Jacques
ICIP
2000
IEEE
15 years 7 months ago
Switched Error Concealment and Robust Coding Decisions in Scalable Video Coding
This work introduces two complementary techniques to improve the packet loss resilience of scalable video coding systems. First, a “switch per-pixel” error concealment (SPEC) ...
Rui Zhang, Shankar L. Regunathan, Kenneth Rose
SIGMOD
1996
ACM
120views Database» more  SIGMOD 1996»
15 years 7 months ago
Query Execution Techniques for Caching Expensive Methods
Object-Relational and Object-Oriented DBMSs allow users to invoke time-consuming ("expensive") methods in their queries. When queries containing these expensive methods a...
Joseph M. Hellerstein, Jeffrey F. Naughton
GECCO
2006
Springer
124views Optimization» more  GECCO 2006»
15 years 6 months ago
Genetic programming for human oral bioavailability of drugs
Automatically assessing the value of bioavailability from the chemical structure of a molecule is a very important issue in biomedicine and pharmacology. In this paper, we present...
Francesco Archetti, Stefano Lanzeni, Enza Messina,...
ASPDAC
2001
ACM
100views Hardware» more  ASPDAC 2001»
15 years 6 months ago
Low power implementation of a turbo-decoder on programmable architectures
Low Power is an extremely important issue for future mobile radio systems. Channel decoders are essential building blocks of base-band signal processing units in mobile terminal ar...
Frank Gilbert, Alexander Worm, Norbert Wehn
« Prev « First page 1319 / 1530 Last » Next »