Sciweavers

204 search results - page 13 / 41
» Fast Set Operations Using Treaps
Sort
View
IJES
2008
102views more  IJES 2008»
14 years 11 months ago
Alternative application-specific processor architectures for fast arbitrary bit permutations
Block ciphers are used to encrypt data and provide data confidentiality. For interoperability reasons, it is desirable to support a variety of block ciphers efficiently. Of the bas...
Zhijie Jerry Shi, Xiao Yang, Ruby B. Lee
CVPR
2010
IEEE
2248views Computer Vision» more  CVPR 2010»
15 years 8 months ago
Morphological Snakes
We introduce a morphological approach to curve evolution. The differential operators used in the standard PDE snake models can be approached using morphological operations...
Luis Álvarez, Luis Baumela, Pedro Henríquez, Pab...
ECCV
2010
Springer
15 years 4 months ago
Fast Covariance Computation and Dimensionality Reduction for Sub-Window Features in Images
This paper presents algorithms for efficiently computing the covariance matrix for features that form sub-windows in a large multidimensional image. For example, several image proc...
HPCA
1997
IEEE
15 years 3 months ago
ATM and Fast Ethernet Network Interfaces for User-Level Communication
Fast Ethernet and ATM are two attractive network technologies for interconnecting workstation clusters for parallel and distributed computing. This paper compares network interfac...
Matt Welsh, Anindya Basu, Thorsten von Eicken
STOC
2003
ACM
193views Algorithms» more  STOC 2003»
15 years 12 months ago
Space efficient dynamic stabbing with fast queries
In dynamic stabbing, we operate on a dynamic set of intervals. A stabbing query asks for an interval containing a given point. This basic problem encodes problems such as method l...
Mikkel Thorup