Sciweavers

657 search results - page 44 / 132
» A Version Numbering Scheme with a Useful Lexicographical Ord...
Sort
View
ASAP
2007
IEEE
219views Hardware» more  ASAP 2007»
15 years 4 months ago
SIMD Vectorization of Histogram Functions
Existing SIMD extensions cannot efficiently vectorize the histogram function due to memory collisions. We propose two techniques to avoid this problem. In the first, a hierarchi...
Asadollah Shahbahrami, Ben H. H. Juurlink, Stamati...
BC
1999
94views more  BC 1999»
14 years 9 months ago
Speed tuning in elementary motion detectors of the correlation type
A prominent model of visual motion detection is the so-called correlation or Reichardt detector. Whereas this model can account for many properties of motion vision, from humans to...
Johannes M. Zanker, M. V. Srinivasan, Martin Egelh...
ICC
2009
IEEE
157views Communications» more  ICC 2009»
15 years 4 months ago
A Graph Approach to Dynamic Fractional Frequency Reuse (FFR) in Multi-Cell OFDMA Networks
A graph-based framework for dynamic fractional frequency reuse (FFR) in multi-cell OFDMA networks is proposed in this work. FFR is a promising resource allocation technique that c...
Ronald Chang, Zhifeng Tao, Jinyun Zhang, C.-C. Jay...
PKC
2011
Springer
219views Cryptology» more  PKC 2011»
14 years 18 days ago
Linearly Homomorphic Signatures over Binary Fields and New Tools for Lattice-Based Signatures
ded abstract of this work appears in Public Key Cryptography — PKC 2011, ed. R. Gennaro, Springer LNCS 6571 (2011), 1–16. This is the full version. We propose a linearly homom...
Dan Boneh, David Mandell Freeman
CCS
2004
ACM
15 years 3 months ago
Lessons learned using alloy to formally specify MLS-PCA trusted security architecture
In order to solve future Multi Level Security (MLS) problems, we have developed a solution based on the DARPA Polymorphous Computing Architecture (PCA). MLS-PCA uses a novel distr...
Brant Hashii