Sciweavers

1170 search results - page 17 / 234
» How Fast Is Too Fast
Sort
View
94
Voted
ARITH
1993
IEEE
15 years 5 months ago
Faster numerical algorithms via exception handling
An attractive paradigm for building fast numerical algorithms is the following: 1 try a fast but occasionally unstable algorithm, 2 test the accuracy of the computed answer, a...
James Demmel, Xiaoye S. Li
CHES
2007
Springer
126views Cryptology» more  CHES 2007»
15 years 7 months ago
How to Maximize the Potential of FPGA Resources for Modular Exponentiation
This paper describes a modular exponentiation processing method and circuit architecture that can exhibit the maximum performance of FPGA resources. The modular exponentiation arch...
Daisuke Suzuki
121
Voted
DAMON
2007
Springer
15 years 7 months ago
The five-minute rule twenty years later, and how flash memory changes the rules
In 1987, Gray and Putzolo presented the five-minute rule, which was reviewed and renewed ten years later in 1997. With the advent of flash memory in the gap between traditional RA...
Goetz Graefe
VALUETOOLS
2006
ACM
176views Hardware» more  VALUETOOLS 2006»
15 years 6 months ago
How to solve large scale deterministic games with mean payoff by policy iteration
Min-max functions are dynamic programming operators of zero-sum deterministic games with finite state and action spaces. The problem of computing the linear growth rate of the or...
Vishesh Dhingra, Stephane Gaubert
106
Voted
FSE
2005
Springer
112views Cryptology» more  FSE 2005»
15 years 6 months ago
How to Maximize Software Performance of Symmetric Primitives on Pentium III and 4 Processors
Abstract. This paper discusses the state-of-the-art software optimization methodology for symmetric cryptographic primitives on Pentium III and 4 processors. We aim at maximizing s...
Mitsuru Matsui, Sayaka Fukuda