Sciweavers

2424 search results - page 297 / 485
» A general algorithm for data dependence analysis
Sort
View
CODES
2005
IEEE
15 years 9 months ago
SOMA: a tool for synthesizing and optimizing memory accesses in ASICs
Arbitrary memory dependencies and variable latency memory systems are major obstacles to the synthesis of large-scale ASIC systems in high-level synthesis. This paper presents SOM...
Girish Venkataramani, Tiberiu Chelcea, Seth Copen ...
SOICT
2010
14 years 10 months ago
Password recovery for encrypted ZIP archives using GPUs
Protecting data by passwords in documents such as DOC, PDF or RAR, ZIP archives has been demonstrated to be weak under dictionary attacks. Time for recovering the passwords of suc...
Pham Hong Phong, Phan Duc Dung, Duong Nhat Tan, Ng...
ICDAR
1999
IEEE
15 years 8 months ago
Character and Document Research in the Open Mind Initiative
We describe the Open Mind Initiative, a framework for large-scale collaborative efforts in building components of "intelligent" systems that address common-sense reasoni...
David G. Stork
COMPGEOM
2011
ACM
14 years 7 months ago
Deconstructing approximate offsets
We consider the offset-deconstruction problem: Given a polygonal shape Q with n vertices, can it be expressed, up to a tolerance ε in Hausdorff distance, as the Minkowski sum o...
Eric Berberich, Dan Halperin, Michael Kerber, Roza...
152
Voted
KDD
2007
ACM
191views Data Mining» more  KDD 2007»
16 years 4 months ago
Cost-effective outbreak detection in networks
Given a water distribution network, where should we place sensors to quickly detect contaminants? Or, which blogs should we read to avoid missing important stories? These seemingl...
Andreas Krause, Carlos Guestrin, Christos Faloutso...