Sciweavers

18374 search results - page 85 / 3675
» Applications for data hiding
Sort
View
151
Voted
MICRO
2010
IEEE
270views Hardware» more  MICRO 2010»
15 years 3 months ago
Many-Thread Aware Prefetching Mechanisms for GPGPU Applications
Abstract-- We consider the problem of how to improve memory latency tolerance in massively multithreaded GPGPUs when the thread-level parallelism of an application is not sufficien...
Jaekyu Lee, Nagesh B. Lakshminarayana, Hyesoon Kim...
ICPP
2009
IEEE
16 years 3 days ago
Speeding Up Distributed MapReduce Applications Using Hardware Accelerators
—In an attempt to increase the performance/cost ratio, large compute clusters are becoming heterogeneous at multiple levels: from asymmetric processors, to different system archi...
Yolanda Becerra, Vicenç Beltran, David Carr...
ICPR
2004
IEEE
16 years 6 months ago
An Image Watermarking Scheme using HVS Characteristics and Spread Transform
The paper presents a robust digital image watermarking scheme that uses both the characteristics of the human visual system (HVS) and statistical information measure. Spread trans...
Malay Kumar Kundu, Santi P. Maity
STOC
2006
ACM
138views Algorithms» more  STOC 2006»
16 years 5 months ago
Searching dynamic point sets in spaces with bounded doubling dimension
We present a new data structure that facilitates approximate nearest neighbor searches on a dynamic set of points in a metric space that has a bounded doubling dimension. Our data...
Richard Cole, Lee-Ad Gottlieb
FMCO
2005
Springer
153views Formal Methods» more  FMCO 2005»
15 years 11 months ago
Smallfoot: Modular Automatic Assertion Checking with Separation Logic
Abstract. Separation logic is a program logic for reasoning about programs that manipulate pointer data structures. We describe Smallfoot, a tool for checking certain lightweight s...
Josh Berdine, Cristiano Calcagno, Peter W. O'Hearn