Sciweavers

7978 search results - page 1517 / 1596
» Combining shared-coin algorithms
Sort
View
IEEEPACT
2006
IEEE
15 years 3 months ago
Fast, automatic, procedure-level performance tuning
This paper presents an automated performance tuning solution, which partitions a program into a number of tuning sections and finds the best combination of compiler options for e...
Zhelong Pan, Rudolf Eigenmann
ISCAS
2006
IEEE
118views Hardware» more  ISCAS 2006»
15 years 3 months ago
A robust continuous-time multi-dithering technique for laser communications using adaptive optics
A robust system architecture to achieve optical coherency free optimization. Several methods that had been proposed in the in multiple-beam free-space laser communication links wit...
Dimitrios N. Loizos, Paul-Peter Sotiriadis, Gert C...
ISCAS
2006
IEEE
145views Hardware» more  ISCAS 2006»
15 years 3 months ago
The wordlength determination problem of linear time invariant systems with multiple outputs - a geometric programming approach
This paper proposes two new methods for optimizing objectives and constraints. The GP approach is very general and hardware resources in finite wordlength implementation of it allo...
S. C. Chan, K. M. Tsui
RTSS
2006
IEEE
15 years 3 months ago
Process-Aware Interrupt Scheduling and Accounting
In most operating systems, the handling of interrupts is typically performed within the address space of the kernel. Moreover, interrupt handlers are invoked asynchronously during...
Yuting Zhang, Richard West
ACISP
2006
Springer
15 years 3 months ago
On Exact Algebraic [Non-]Immunity of S-Boxes Based on Power Functions
In this paper we are interested in algebraic immunity of several well known highly-nonlinear vectorial Boolean functions (or Sboxes), designed for block and stream ciphers. Unfortu...
Nicolas Courtois, Blandine Debraize, Eric Garrido
« Prev « First page 1517 / 1596 Last » Next »