Sciweavers

3037 search results - page 541 / 608
» A High Performance Application Representation for Reconfigur...
Sort
View
PAMI
2011
14 years 8 months ago
Matching Forensic Sketches to Mug Shot Photos
—The problem of matching a forensic sketch to a gallery of mug shot images is addressed in this paper. Previous research in sketch matching only offered solutions to matching hig...
Brendan Klare, Zhifeng Li, Anil K. Jain
DELTA
2006
IEEE
15 years 5 months ago
Modified Montgomery Modular Multiplication Using 4: 2 Compressor and CSA Adder
The efficiency of the Public Key encryption systems like RSA and ECC can be improved with the adoption of a faster multiplication scheme. In this paper, Modified Montgomery multip...
Himanshu Thapliyal, Anvesh Ramasahayam, Vivek Redd...
ACMSE
2010
ACM
14 years 12 months ago
Visualization of the CreSIS Greenland data sets
The Center for Remote Sensing of Ice Sheets (CReSIS) has been compiling Greenland ice sheet thickness data since 1993. The airborne program utilizes a 150 MHz radar echo sounder to...
Shaketia L. McCoy, Michael Austin, Frensha Slaught...
IEEEPACT
2009
IEEE
15 years 8 months ago
StealthTest: Low Overhead Online Software Testing Using Transactional Memory
—Software testing is hard. The emergence of multicore architectures and the proliferation of bugprone multithreaded software makes testing even harder. To this end, researchers h...
Jayaram Bobba, Weiwei Xiong, Luke Yen, Mark D. Hil...
105
Voted
DATE
2005
IEEE
136views Hardware» more  DATE 2005»
15 years 7 months ago
Increasing Register File Immunity to Transient Errors
Transient errors are one of the major reasons for system downtime in many systems. While prior research has mainly focused on the impact of transient errors on datapath, caches an...
Gokhan Memik, Mahmut T. Kandemir, Ozcan Ozturk