Sciweavers

19320 search results - page 3761 / 3864
» On the complexity of computing determinants
Sort
View
GECCO
2007
Springer
162views Optimization» more  GECCO 2007»
15 years 4 months ago
Some novel locality results for the blob code spanning tree representation
The Blob Code is a bijective tree code that represents each tree on n labelled vertices as a string of n − 2 vertex labels. In recent years, several researchers have deployed th...
Tim Paulden, David K. Smith
HIPEAC
2007
Springer
15 years 4 months ago
A Throughput-Driven Task Creation and Mapping for Network Processors
Abstract. Network processors are programmable devices that can process packets at a high speed. A network processor is typified by multithreading and heterogeneous multiprocessing...
Lixia Liu, Xiao-Feng Li, Michael K. Chen, Roy Dz-C...
IBPRIA
2007
Springer
15 years 4 months ago
Optimally Discriminant Moments for Speckle Detection in Real B-Scan Images
Detection of speckle in ultrasound (US) images has been regarded as an important research topic in US imaging, mainly focusing on two specific applications: improving signal to no...
Robert Marti, Joan Martí, Jordi Freixenet, ...
IESS
2007
Springer
165views Hardware» more  IESS 2007»
15 years 4 months ago
Data Reuse Driven Memory and Network-On-Chip Co-Synthesis
NoCs present a possible communication infrastructure solution to deal with increased design complexity and shrinking time-to-market. The communication infrastructure is a signific...
Ilya Issenin, Nikil Dutt
ISW
2007
Springer
15 years 4 months ago
New Weaknesses in the Keystream Generation Algorithms of the Stream Ciphers TPy and Py
The stream ciphers Py, Py6 designed by Biham and Seberry were promising candidates in the ECRYPT-eSTREAM project because of their impressive speed. Since their publication in Apri...
Gautham Sekar, Souradyuti Paul, Bart Preneel
« Prev « First page 3761 / 3864 Last » Next »