Sciweavers

1585 search results - page 283 / 317
» Automatically optimizing secure computation
Sort
View
ISLPED
2005
ACM
85views Hardware» more  ISLPED 2005»
15 years 5 months ago
A low-power crossroad switch architecture and its core placement for network-on-chip
As the number of cores on a chip increases, power consumed by the communication structures takes significant portion of the overall power-budget. The individual components of the...
Kuei-Chung Chang, Jih-Sheng Shen, Tien-Fu Chen
EMMCVPR
2005
Springer
15 years 5 months ago
Dynamic Shape and Appearance Modeling Via Moving and Deforming Layers
Abstract. We propose a model of the shape, motion and appearance of a sequence of images that captures occlusions, scene deformations, arbitrary viewpoint variations and changes in...
Jeremy D. Jackson, Anthony J. Yezzi, Stefano Soatt...
ICCS
2005
Springer
15 years 5 months ago
Fast Expression Templates
Abstract. Expression templates (ET) can significantly reduce the implementation effort of mathematical software. For some compilers, especially for those of supercomputers, it ca...
Jochen Härdtlein, Alexander Linke, Christoph ...
113
Voted
ICCS
2005
Springer
15 years 5 months ago
Querying a Bioinformatic Data Sources Registry with Concept Lattices
Abstract Bioinformatic data sources available on the web are multiple and heterogenous. The lack of documentation and the difficulty of interaction with these data banks require us...
Nizar Messai, Marie-Dominique Devignes, Amedeo Nap...
ASPLOS
2004
ACM
15 years 5 months ago
Programming with transactional coherence and consistency (TCC)
Transactional Coherence and Consistency (TCC) offers a way to simplify parallel programming by executing all code within transactions. In TCC systems, transactions serve as the fu...
Lance Hammond, Brian D. Carlstrom, Vicky Wong, Ben...