Sciweavers

1528 search results - page 90 / 306
» Implementing Generalized Operator Overloading
Sort
View
WCE
2007
15 years 6 months ago
MR Image Reconstruction from Pseudo-Hex Lattice Sampling Patterns Using Separable FFT
Abstract— Common MRI sampling patterns in kspace, such as spiral trajectories, have nonuniform density and do not lie on a rectangular grid. We propose mapping the sampled data t...
Jae-Ho Kim, Fred L. Fontaine
ICWE
2010
Springer
15 years 3 months ago
Syncro - Concurrent Editing Library for Google Wave
Abstract. The web accelerated the way people collaborate globally distributed. With Google Wave, a rich and extensible real-time collaboration platform is becoming available to a l...
Michael Goderbauer, Markus Goetz, Alexander Gro&sz...
DAC
2002
ACM
16 years 5 months ago
Scheduler-based DRAM energy management
Previous work on DRAM power-mode management focused on hardware-based techniques and compiler-directed schemes to explicitly transition unused memory modules to low-power operatin...
Victor Delaluz, Anand Sivasubramaniam, Mahmut T. K...
EUROSYS
2006
ACM
16 years 1 months ago
A quantitative analysis of aspects in the eCos kernel
Nearly ten years after its first presentation and five years after its first application to operating systems, the suitability of AspectOriented Programming (AOP) for the devel...
Daniel Lohmann, Fabian Scheler, Reinhard Tartler, ...
SACRYPT
2004
Springer
105views Cryptology» more  SACRYPT 2004»
15 years 10 months ago
Provably Secure Masking of AES
A general method to secure cryptographic algorithm implementations against side-channel attacks is the use of randomization techniques and, in particular, masking. Roughly speaking...
Johannes Blömer, Jorge Guajardo, Volker Krumm...