Sciweavers

1108 search results - page 106 / 222
» Algorithm Transformation for FPGA Implementation
Sort
View
AAAI
1997
15 years 3 months ago
Model-Theoretic Semantics and Tractable Algorithm for CNF-BCP
CNF-BCP is a well-known propositional reasoner that extends clausal Boolean Constraint Propagation (BCP) to non-clausal theories. Although BCP has efficient linear-time implementa...
Rahul Roy-Chowdhury, Mukesh Dalal
INFOCOM
2006
IEEE
15 years 8 months ago
Reverse Hashing for High-Speed Network Monitoring: Algorithms, Evaluation, and Applications
— A key function for network traffic monitoring and analysis is the ability to perform aggregate queries over multiple data streams. Change detection is an important primitive w...
Robert T. Schweller, Zhichun Li, Yan Chen, Yan Gao...
CVPR
1997
IEEE
16 years 4 months ago
Euclidean Reconstruction from Image Sequences with Varying and Unknown Focal Length and Principal Point
In this paper the special case of reconstruction from image sequences taken by cameras with skew equal to 0 and aspect ratio equal to 1 has been treated. These type of cameras, he...
Anders Heyden, Kalle Åström
CORR
2010
Springer
198views Education» more  CORR 2010»
15 years 2 months ago
Space and the Synchronic A-Ram
Space is a spatial programming language designed to exploit the massive parallelism available in a formal model of computation called the Synchronic A-Ram, and physically related ...
Alexander Victor Berka
DATE
2010
IEEE
182views Hardware» more  DATE 2010»
15 years 7 months ago
Fault-based attack of RSA authentication
For any computing system to be secure, both hardware and software have to be trusted. If the hardware layer in a secure system is compromised, not only it would be possible to ext...
Andrea Pellegrini, Valeria Bertacco, Todd M. Austi...