Sciweavers

2863 search results - page 293 / 573
» Comparing Operating Systems Using Robustness Benchmarks
Sort
View
JAR
2000
145views more  JAR 2000»
15 years 4 months ago
Logical Cryptanalysis as a SAT Problem
Cryptographic algorithms play a key role in computer security and the formal analysis of their robustness is of utmost importance. Yet, logic and automated reasoning tools are seld...
Fabio Massacci, Laura Marraro
CSL
2010
Springer
15 years 4 months ago
Monaural speech separation and recognition challenge
Robust speech recognition in everyday conditions requires the solution to a number of challenging problems, not least the ability to handle multiple sound sources. The specific ca...
Martin Cooke, John R. Hershey, Steven J. Rennie
HOTOS
2007
IEEE
15 years 8 months ago
Hyperspaces for Object Clustering and Approximate Matching in Peer-to-Peer Overlays
Existing distributed hash tables provide efficient mechanisms for storing and retrieving a data item based on an exact key, but are unsuitable when the search key is similar, but ...
Bernard Wong, Ymir Vigfusson, Emin Gün Sirer
TASE
2008
IEEE
15 years 4 months ago
Automated Planning and Optimization of Lumber Production Using Machine Vision and Computed Tomography
An automated system for planning and optimization of lumber production using Machine Vision and Computed Tomography (CT) is proposed. Cross-sectional CT images of hardwood logs are...
Suchendra M. Bhandarkar, Xingzhi Luo, Richard F. D...
HPCC
2009
Springer
15 years 9 months ago
On Instruction-Level Method for Reducing Cache Penalties in Embedded VLIW Processors
Usual cache optimisation techniques for high performance computing are difficult to apply in embedded VLIW applications. First, embedded applications are not always well structur...
Samir Ammenouche, Sid Ahmed Ali Touati, William Ja...