Sciweavers

10146 search results - page 1658 / 2030
» Fast FAST
Sort
View
CONCURRENCY
2007
95views more  CONCURRENCY 2007»
15 years 5 months ago
Automated and accurate cache behavior analysis for codes with irregular access patterns
Abstract. The memory hierarchy plays an essential role in the performance of current computers, thus good analysis tools that help predict and understand its behavior are required....
Diego Andrade, Manuel Arenaz, Basilio B. Fraguela,...
IJNSEC
2006
94views more  IJNSEC 2006»
15 years 5 months ago
A Binary Redundant Scalar Point Multiplication in Secure Elliptic Curve Cryptosystems
The main back-bone operation in elliptic curve cryptosystems is scalar point multiplication. The most frequently used method implementing the scalar point multiplication which is ...
Sangook Moon
IJON
2006
95views more  IJON 2006»
15 years 5 months ago
Generalized relevance LVQ (GRLVQ) with correlation measures for gene expression analysis
A correlation-based similarity measure is derived for generalized relevance learning vector quantization (GRLVQ). The resulting GRLVQ-C classifier makes Pearson correlation availa...
Marc Strickert, Udo Seiffert, Nese Sreenivasulu, W...
IJON
2006
169views more  IJON 2006»
15 years 5 months ago
Denoising using local projective subspace methods
In this paper we present denoising algorithms for enhancing noisy signals based on Local ICA (LICA), Delayed AMUSE (dAMUSE) and Kernel PCA (KPCA). The algorithm LICA relies on app...
Peter Gruber, Kurt Stadlthanner, Matthias Böh...
CORR
2007
Springer
135views Education» more  CORR 2007»
15 years 5 months ago
The Unix KISS: A Case Study
In this paper we show that the initial philosophy used in designing and developing UNIX in early times has been forgotten due to “fast practices”. We question the leitmotif th...
Franco Milicchio
« Prev « First page 1658 / 2030 Last » Next »