Sciweavers

7648 search results - page 1390 / 1530
» A Data Locality Optimizing Algorithm
Sort
View
TIT
2002
129views more  TIT 2002»
15 years 2 months ago
Arbitrary source models and Bayesian codebooks in rate-distortion theory
-- We characterize the best achievable performance of lossy compression algorithms operating on arbitrary random sources, and with respect to general distortion measures. Direct an...
Ioannis Kontoyiannis, Junshan Zhang
ACIVS
2010
Springer
15 years 14 days ago
Exploiting Neighbors for Faster Scanning Window Detection in Images
Detection of objects through scanning windows is widely used and accepted method. The detectors traditionally do not make use of information that is shared between neighboring imag...
Pavel Zemcík, Michal Hradis, Adam Herout
DSD
2010
IEEE
137views Hardware» more  DSD 2010»
15 years 13 days ago
A C-to-RTL Flow as an Energy Efficient Alternative to Embedded Processors in Digital Systems
We present a high-level synthesis flow for mapping an algorithm description (in C) to a provably equivalent registertransfer level (RTL) description of hardware. This flow uses an ...
Sameer D. Sahasrabuddhe, Sreenivas Subramanian, Ku...
135
Voted
GLOBECOM
2010
IEEE
15 years 12 days ago
Relay Station Placement for Cooperative Communications in WiMAX Networks
The recently emerging WiMAX (IEEE 802.16) is a promising telecommunication technology to provide low-cost, high-speed and long-range wireless communications. To meet the growing de...
Dejun Yang, Xi Fang, Guoliang Xue, Jian Tang
IPPS
2010
IEEE
15 years 10 days ago
Head-body partitioned string matching for Deep Packet Inspection with scalable and attack-resilient performance
Abstract--Dictionary-based string matching (DBSM) is a critical component of Deep Packet Inspection (DPI), where thousands of malicious patterns are matched against high-bandwidth ...
Yi-Hua E. Yang, Viktor K. Prasanna, Chenqian Jiang
« Prev « First page 1390 / 1530 Last » Next »