Sciweavers

722 search results - page 31 / 73
» Efficient Generation of Prime Numbers
Sort
View
142 views 141 votes 15 years 5 months ago  EUROPAR 2010»
Abstract. To resolve difficulties in parallel programming, a large number of studies are conducted on parallel skeletons and optimization theorems over skeleton programs. However, ...
180 views 143 votes 15 years 2 months ago  IPPS 2010»
Millions of DNA sequences (reads) are generated by Next Generation Sequencing machines everyday. There is a need for high performance algorithms to map these sequences to the refer...
125 views 226 votes 16 years 5 months ago  ICDE 2004»
Data cube computation and representation are prohibitively expensive in terms of time and space. Prior work has focused on either reducing the computation time or condensing the r...
151 views 135 votes 15 years 8 months ago  RT 1998»
Abstract. This paper presents how the image-based rendering technique of viewdependent texture-mapping (VDTM) can be efficiently implemented using projective texture mapping, a fea...
237 views 142 votes 16 years 6 months ago  ICCV 2005»
The objective of this work is automatic detection and identification of individuals in unconstrained consumer video, given a minimal number of labelled faces as training data. Whi...
195 views 159 votes 15 years 2 months ago  ICST 2010»
A Feature Model (FM) is a compact representation of all the products of a software product line. The automated extraction of information from FMs is a thriving research topic invo...
88 views 124 votes 15 years 8 months ago  ASPDAC 2007»
Using multiple supply voltages on a SoC design is an efficient way to achieve low power. However, it may lead to a complex power network and a huge number of level shifters if we j...
96 views 146 votes 15 years 8 months ago  FPL 2000»
Coarse-grain reconfigurable architectures have been a matter of intense research in the last few years. They promise to be more adequate for computational tasks due to their better...
73 views 146 votes 15 years 8 months ago  ACSAC 2000»
We present a new commerce protocol that allows customers and merchants to conduct face-to-face creditcard authorizations with a credit card company securely with the option of ano...
148 views 166 votes 15 years 8 months ago  CIAC 1994»
We consider the problem of maintaining a binary search tree (BST) that minimizes the average access cost needed to satisfy randomly generated requests. We analyze scenarios in whi...