Sciweavers

1190 search results - page 198 / 238
» On the Optimization of Resource Utilization in Distributed M...
Sort
View
IJACTAICIT
2010
185views more  IJACTAICIT 2010»
14 years 7 months ago
Adaptive Bandwidth Allocation Scheme for Cognitive Radios
In recent past, cognitive radio has come out to as a promising solution to the spectrum scarcity problem. It tends to increase the spectrum utilization by making use of underutili...
Prabhjot Kaur, Moin Uddin, Arun Khosla
CCGRID
2011
IEEE
14 years 1 months ago
Small Discrete Fourier Transforms on GPUs
– Efficient implementations of the Discrete Fourier Transform (DFT) for GPUs provide good performance with large data sizes, but are not competitive with CPU code for small data ...
S. Mitra, A. Srinivasan
TC
2008
14 years 9 months ago
Cryptanalysis with COPACOBANA
Cryptanalysis of ciphers usually involves massive computations. The security parameters of cryptographic algorithms are commonly chosen so that attacks are infeasible with availabl...
Tim Güneysu, Timo Kasper, Martin Novotn&yacut...
MICRO
2005
IEEE
130views Hardware» more  MICRO 2005»
15 years 3 months ago
Exploiting Vector Parallelism in Software Pipelined Loops
An emerging trend in processor design is the addition of short vector instructions to general-purpose and embedded ISAs. Frequently, these extensions are employed using traditiona...
Samuel Larsen, Rodric M. Rabbah, Saman P. Amarasin...
MM
2004
ACM
109views Multimedia» more  MM 2004»
15 years 3 months ago
Loss-resilient on-demand media streaming using priority encoding
A novel solution to the reliable multicast problem is the “digital fountain” approach, in which data is encoded with an erasure protection code before transmission, and receiv...
Cheng Huang, Ramaprabhu Janakiraman, Lihao Xu