Sciweavers

1055 search results - page 205 / 211
» A system level perspective on branch architecture performanc...
Sort
View
ISCA
2010
IEEE
305views Hardware» more  ISCA 2010»
15 years 4 months ago
Rethinking DRAM design and organization for energy-constrained multi-cores
DRAM vendors have traditionally optimized the cost-perbit metric, often making design decisions that incur energy penalties. A prime example is the overfetch feature in DRAM, wher...
Aniruddha N. Udipi, Naveen Muralimanohar, Niladris...
ICIP
2002
IEEE
16 years 1 months ago
An automatic scheme for stereoscopic video object-based watermarking using qualified significant wavelet trees
In this paper a fully automatic system for embedding visually recognizable watermark patterns to video objects is proposed. The architecture consists of 3 main modules. During the...
Nikolaos D. Doulamis, Anastasios D. Doulamis, Stef...
IWCMC
2006
ACM
15 years 5 months ago
Optimal hierarchical energy efficient design for MANETs
Due to the growing interest in mobile wireless Ad-Hoc networks’ (MANETs) applications, researchers have proposed many routing protocols that differ in their objective. Energy ef...
Wasim El-Hajj, Dionysios Kountanis, Ala I. Al-Fuqa...
ADBIS
1995
Springer
155views Database» more  ADBIS 1995»
15 years 3 months ago
The MaStA I/O Cost Model and its Validation Strategy
Crash recovery in database systems aims to provide an acceptable level of protection from failure at a given engineering cost. A large number of recovery mechanisms are known, and...
S. Scheuerl, Richard C. H. Connor, Ronald Morrison...
DASFAA
2009
IEEE
193views Database» more  DASFAA 2009»
15 years 2 months ago
Encryption over Semi-trusted Database
—Database security has become a vital issue in modern Web applications. Critical business data in databases is an evident target for attack. Therefore, ensuring the confidentiali...
Hasan Kadhem, Toshiyuki Amagasa, Hiroyuki Kitagawa