Sciweavers

18306 search results - page 3192 / 3662
» Algorithmics in Exponential Time
Sort
View
ASPDAC
2004
ACM
96views Hardware» more  ASPDAC 2004»
15 years 8 months ago
Rate analysis for streaming applications with on-chip buffer constraints
While mapping a streaming (such as multimedia or network packet processing) application onto a specified architecture, an important issue is to determine the input stream rates tha...
Alexander Maxiaguine, Simon Künzli, Samarjit ...
ASPDAC
2004
ACM
218views Hardware» more  ASPDAC 2004»
15 years 8 months ago
A compressed frame buffer to reduce display power consumption in mobile systems
Abstract-- Despite the limited power available in a batteryoperated hand-held device, a display system must still have an enough resolution and sufficient color depth to deliver th...
Hojun Shim, Naehyuck Chang, Massoud Pedram
AUSAI
2004
Springer
15 years 8 months ago
Using Classification to Evaluate the Output of Confidence-Based Association Rule Mining
Abstract. Association rule mining is a data mining technique that reveals interesting relationships in a database. Existing approaches employ different parameters to search for int...
Stefan Mutter, Mark Hall, Eibe Frank
CODES
2004
IEEE
15 years 8 months ago
Optimizing the memory bandwidth with loop fusion
The memory bandwidth largely determines the performance and energy cost of embedded systems. At the compiler level, several techniques improve the memory bandwidth at the scope of...
Paul Marchal, José Ignacio Gómez, Fr...
COMPSAC
2004
IEEE
15 years 8 months ago
A Novel Key Management Scheme for Dynamic Access Control in a User Hierarchy
Considering the solution of dynamic access problems in a user hierarchy, a novel scheme based on one-way hash function is proposed to manage the cryptographic keys in the paper. T...
Tzer-Shyong Chen, Yu-Fang Chung, Chang-Sin Tian
« Prev « First page 3192 / 3662 Last » Next »