Sciweavers

634 search results - page 42 / 127
» Groundwork for Weak Analysis
Sort
View
ISCA
2003
IEEE
212views Hardware» more  ISCA 2003»
15 years 7 months ago
A Performance Analysis of PIM, Stream Processing, and Tiled Processing on Memory-Intensive Signal Processing Kernels
Trends in microprocessors of increasing die size and clock speed and decreasing feature sizes have fueled rapidly increasing performance. However, the limited improvements in DRAM...
Jinwoo Suh, Eun-Gyu Kim, Stephen P. Crago, Lakshmi...
DAGM
2004
Springer
15 years 5 months ago
Differential Analysis of Two Model-Based Vehicle Tracking Approaches
An experimental comparison of `Edge-Element Association (EEA)' and `Marginalized Contour (MCo)' approaches for 3D modelbased vehicle tracking in traffic scenes is complic...
Hendrik Dahlkamp, Arthur E. C. Pece, Artur Ottlik,...
COR
2006
122views more  COR 2006»
15 years 1 months ago
Experimental Analysis of Approximation Algorithms for the Vertex Cover and Set Covering Problems
Several approximation algorithms with proven performance guarantees have been proposed to find approximate solutions to classical combinatorial optimization problems. However, the...
Fernando C. Gomes, Cláudio Nogueira de Mene...
SIGECOM
2008
ACM
127views ECommerce» more  SIGECOM 2008»
15 years 1 months ago
Posted prices vs. negotiations: an asymptotic analysis
Full revelation of private values is impractical in many large-scale markets, where posted price mechanisms are a simpler alternative. In this work, we compare the asymptotic beha...
Liad Blumrosen, Thomas Holenstein
JOC
2000
130views more  JOC 2000»
15 years 1 months ago
A Detailed Analysis of SAFER K
In this paper we analyze the block cipher SAFER K. First, we show a weakness in the key schedule, that has the effect that for almost every key there exists on the average three an...
Lars R. Knudsen