Sciweavers

679 search results - page 106 / 136
» Algorithmic modifications to SPIHT
Sort
View
ICCCN
1997
IEEE
15 years 7 months ago
Effective Search Strategies for Application-Independent Speedup in UDP Demultiplexing
We present UDP datagram demultiplexing techniques that can yield potentially substantial applicationindependent performance gains over BSD-derived UDP implementations. Our demulti...
Joseph T. Dixon, Kenneth L. Calvert
138
Voted
CIARP
2007
Springer
15 years 7 months ago
Bagging with Asymmetric Costs for Misclassified and Correctly Classified Examples
Abstract. Diversity is a key characteristic to obtain advantages of combining predictors. In this paper, we propose a modification of bagging to explicitly trade off diversity and ...
Ricardo Ñanculef, Carlos Valle, Héct...
ICCAD
2007
IEEE
165views Hardware» more  ICCAD 2007»
15 years 7 months ago
Automated refinement checking of concurrent systems
Stepwise refinement is at the core of many approaches to synthesis and optimization of hardware and software systems. For instance, it can be used to build a synthesis approach for...
Sudipta Kundu, Sorin Lerner, Rajesh Gupta
GLVLSI
2009
IEEE
128views VLSI» more  GLVLSI 2009»
15 years 7 months ago
Impact of lithography-friendly circuit layout
Current lithography techniques use a light wavelength of 193nm to print sub-65nm features. This introduces process variations which cause mismatches between desired and actual waf...
Pratik J. Shah, Jiang Hu
ASAP
2004
IEEE
127views Hardware» more  ASAP 2004»
15 years 7 months ago
A Public-Key Cryptographic Processor for RSA and ECC
We describe a general-purpose processor architecture for accelerating public-key computations on server systems that demand high performance and flexibility to accommodate large n...
Hans Eberle, Nils Gura, Sheueling Chang Shantz, Vi...