Sciweavers

814 search results - page 131 / 163
» Improving the execution time of global communication operati...
Sort
View
CHES
2008
Springer
132views Cryptology» more  CHES 2008»
15 years 3 months ago
Light-Weight Instruction Set Extensions for Bit-Sliced Cryptography
Bit-slicing is a non-conventional implementation technique for cryptographic software where an n-bit processor is considered as a collection of n 1-bit execution units operating in...
Philipp Grabher, Johann Großschädl, Dan...
DPHOTO
2010
208views Hardware» more  DPHOTO 2010»
15 years 3 months ago
A signature analysis based method for elliptical shape
The high level context image analysis regards many fields as face recognition, smile detection, automatic red eye removal, iris recognition, fingerprint verification, etc. Techniq...
Ivana Guarneri, Mirko Guarnera, Giuseppe Messina, ...
FMOODS
2007
15 years 3 months ago
A Probabilistic Formal Analysis Approach to Cross Layer Optimization in Distributed Embedded Systems
We present a novel approach, based on probabilistic formal methods, to developing cross-layer resource optimization policies for resource limited distributed systems. One objective...
Minyoung Kim, Mark-Oliver Stehr, Carolyn L. Talcot...
DAMON
2009
Springer
15 years 3 months ago
k-ary search on modern processors
This paper presents novel tree-based search algorithms that exploit the SIMD instructions found in virtually all modern processors. The algorithms are a natural extension of binar...
Benjamin Schlegel, Rainer Gemulla, Wolfgang Lehner
ESWA
2008
152views more  ESWA 2008»
15 years 2 months ago
Collaborative recommender systems: Combining effectiveness and efficiency
Recommender systems base their operation on past user ratings over a collection of items, for instance, books, CDs, etc. Collaborative filtering (CF) is a successful recommendatio...
Panagiotis Symeonidis, Alexandros Nanopoulos, Apos...