Sciweavers

2194 search results - page 99 / 439
» Improving HLRTA*( k )
Sort
View
IACR
2011
124views more  IACR 2011»
14 years 1 months ago
Using the Cloud to Determine Key Strengths
We develop a new methodology to assess cryptographic key strength using cloud computing, by calculating the true economic cost of (symmetric- or private-) key retrieval for the mos...
Thorsten Kleinjung, Arjen K. Lenstra, Dan Page, Ni...
IEEEPACT
1998
IEEE
15 years 6 months ago
Exploiting Method-Level Parallelism in Single-Threaded Java Programs
Method speculation of object-oriented programs attempts to exploit method-level parallelism (MLP) by executing sequential method invocations in parallel, while still maintaining c...
Michael K. Chen, Kunle Olukotun
IPPS
1998
IEEE
15 years 6 months ago
A Mapping Methodology for Designing Software Task Pipelines for Embedded Signal Processing
Abstract. In this paper, we present a methodology for mapping an Embedded Signal Processing ESP application onto HPC platforms such that the throughput performance is maximized. Pr...
Myungho Lee, Wenheng Liu, Viktor K. Prasanna
CCGRID
2006
IEEE
15 years 5 months ago
Design of High Performance MVAPICH2: MPI2 over InfiniBand
MPICH2 provides a layered architecture for implementing MPI-2. In this paper, we provide a new design for implementing MPI-2 over InfiniBand by extending the MPICH2 ADI3 layer. Ou...
Wei Huang, Gopalakrishnan Santhanaraman, Hyun-Wook...
DAS
2006
Springer
15 years 5 months ago
A Semi-automatic Adaptive OCR for Digital Libraries
This paper presents a novel approach for designing a semi-automatic adaptive OCR for large document image collections in digital libraries. We describe an interactive system for co...
Sachin Rawat, K. S. Sesh Kumar, Million Meshesha, ...