Sciweavers

1184 search results - page 182 / 237
» Memory Design for Constrained Dynamic Optimization Problems
Sort
View
TIP
2010
107views more  TIP 2010»
14 years 8 months ago
Risk-Distortion Analysis for Video Collusion Attacks: A Mouse-and-Cat Game
Copyright protection is a key issue for video sharing over public networks. To protect the video content from unauthorized redistribution, digital fingerprinting is commonly used. ...
Yan Chen, W. Sabrina Lin, K. J. Ray Liu
ICC
2009
IEEE
144views Communications» more  ICC 2009»
14 years 11 months ago
Green DSL: Energy-Efficient DSM
Dynamic spectrum management (DSM) has been recognized as a key technology for tackling multi-user crosstalk interference for DSL broadband access. Up to now, DSM design has mainly ...
Paschalis Tsiaflakis, Yung Yi, Mung Chiang, Marc M...
CASES
2008
ACM
15 years 3 months ago
Efficient vectorization of SIMD programs with non-aligned and irregular data access hardware
Automatic vectorization of programs for partitioned-ALU SIMD (Single Instruction Multiple Data) processors has been difficult because of not only data dependency issues but also n...
Hoseok Chang, Wonyong Sung
CORR
2007
Springer
47views Education» more  CORR 2007»
15 years 1 months ago
Data Structures for Mergeable Trees
Motivated by an application in computational topology, we consider a novel variant of the problem of efficiently maintaining dynamic rooted trees. This variant allows an operation...
Loukas Georgiadis, Haim Kaplan, Nira Shafrir, Robe...
110
Voted
DATE
2009
IEEE
110views Hardware» more  DATE 2009»
15 years 8 months ago
Light NUCA: A proposal for bridging the inter-cache latency gap
Abstract—To deal with the “memory wall” problem, microprocessors include large secondary on-chip caches. But as these caches enlarge, they originate a new latency gap between...
Darío Suárez Gracia, Teresa Monreal,...