Sciweavers

914 search results - page 155 / 183
» Assessing the performance limits of parallelized near-thresh...
Sort
View
118
Voted
ICMCS
2007
IEEE
255views Multimedia» more  ICMCS 2007»
15 years 6 months ago
Distributed Architecture for Large Scale Image-Based Search
In recent years, some computer vision algorithms such as SIFT (Scale Invariant Feature Transform) have been employed in image similarity match to perform image-based search applic...
Yu Zheng, Xing Xie, Wei-Ying Ma
ASAP
2006
IEEE
110views Hardware» more  ASAP 2006»
15 years 6 months ago
Low-Cost Elliptic Curve Digital Signature Coprocessor for Smart Cards
This paper proposes different low-cost coprocessors for public key authentication on 8-bit smart cards. Elliptic curve cryptography is used for its efficiency per bit of key and ...
Guerric Meurice de Dormale, Renaud Ambroise, David...
103
Voted
VTC
2006
IEEE
117views Communications» more  VTC 2006»
15 years 6 months ago
Frequency-Domain Eigenbeam-SDM and Equalization for High Speed Data Transmissions
— In wireless communications, the channel consists of many resolvable paths with different time delays, resulting in a severely frequency-selective fading channel. The frequencyd...
Kazuyuki Ozaki, Akinori Nakajima, Fumiyuki Adachi
ISPASS
2005
IEEE
15 years 6 months ago
On the Scalability of 1- and 2-Dimensional SIMD Extensions for Multimedia Applications
SIMD extensions are the most common technique used in current processors for multimedia computing. In order to obtain more performance for emerging applications SIMD extensions ne...
Friman Sánchez, Mauricio Alvarez, Esther Sa...
ASPLOS
2006
ACM
15 years 4 months ago
Comprehensively and efficiently protecting the heap
The goal of this paper is to propose a scheme that provides comprehensive security protection for the heap. Heap vulnerabilities are increasingly being exploited for attacks on co...
Mazen Kharbutli, Xiaowei Jiang, Yan Solihin, Guru ...