Sciweavers

15033 search results - page 2956 / 3007
» Complexity Theory and Algorithms
Sort
View
MICCAI
2000
Springer
15 years 1 months ago
Motion-Based Robotic Instrument Targeting under C-Arm Fluoroscopy
: We present a simple and precise robot targeting method under portable x-ray fluoroscopy based on image servoing. The method is implemented for needle alignment in percutaneous pr...
Alexandru Patriciu, Dan Stoianovici, Louis L. Whit...
ICCD
1995
IEEE
109views Hardware» more  ICCD 1995»
15 years 1 months ago
Verifying the performance of the PCI local bus using symbolic techniques
Symbolic model checking is a successful technique for checking properties of large finite-state systems. This method has been used to verify a number of real-world hardware desig...
Sérgio Vale Aguiar Campos, Edmund M. Clarke...
UIST
1997
ACM
15 years 1 months ago
Interactive Beautification: A Technique for Rapid Geometric Design
We propose interactive beautification, a technique for rapid geometric design, and introduce the technique and its algorithm with a prototype system Pegasus. The motivation is to ...
Takeo Igarashi, Satoshi Matsuoka, Sachiko Kawachiy...
PARA
1995
Springer
15 years 1 months ago
A Proposal for a Set of Parallel Basic Linear Algebra Subprograms
This paper describes a proposal for a set of Parallel Basic Linear Algebra Subprograms PBLAS. The PBLAS are targeted at distributed vector-vector, matrix-vector and matrixmatrix...
Jaeyoung Choi, Jack Dongarra, Susan Ostrouchov, An...
AFRICACRYPT
2010
Springer
15 years 1 months ago
Practical Improvements of Profiled Side-Channel Attacks on a Hardware Crypto-Accelerator
Abstract. This article investigates the relevance of the theoretical framework on profiled side-channel attacks presented by F.-X. Standaert et al. at Eurocrypt 2009. The analyses ...
M. Abdelaziz Elaabid, Sylvain Guilley
« Prev « First page 2956 / 3007 Last » Next »