Sciweavers

1585 search results - page 263 / 317
» Automatically optimizing secure computation
Sort
View
DAC
2000
ACM
15 years 4 months ago
Macro-driven circuit design methodology for high-performance datapaths
Datapath design is one of the most critical elements in the design of a high performance microprocessor. However datapath design is typically done manually, and is often custom st...
Mahadevamurty Nemani, Vivek Tiwari
GCC
2006
Springer
15 years 3 months ago
Amadeus: A Holistic Service-oriented Environment for Grid Workflows
In this paper we present Amadeus, which is a holistic service-oriented environment for QoS-aware Grid workflows. Amadeus considers user's requirements, in terms of QoS constr...
Ivona Brandic, Sabri Pllana, Siegfried Benkner
ECCV
2010
Springer
15 years 1 months ago
Descriptor Learning for Efficient Retrieval
Many visual search and matching systems represent images using sparse sets of "visual words": descriptors that have been quantized by assignment to the best-matching symb...
JAIR
2008
123views more  JAIR 2008»
14 years 11 months ago
CTL Model Update for System Modifications
Model checking is a promising technology, which has been applied for verification of many hardware and software systems. In this paper, we introduce the concept of model update to...
Yan Zhang, Yulin Ding
SAC
2006
ACM
14 years 11 months ago
Assisted verification of elementary functions using Gappa
The implementation of a correctly rounded or interval elementary function needs to be proven carefully in the very last details. The proof requires a tight bound on the overall er...
Florent de Dinechin, Christoph Quirin Lauter, Guil...