Sciweavers

2703 search results - page 499 / 541
» Optimizing memory transactions
Sort
View
EGH
2011
Springer
14 years 13 days ago
Simpler and Faster HLBVH with Work Queues
A recently developed algorithm called Hierachical Linear Bounding Volume Hierarchies (HLBVH) has demonstrated the feasibility of reconstructing the spatial index needed for ray tr...
Kirill Garanzha, Jacopo Pantaleoni, David K. McAll...
IACR
2011
252views more  IACR 2011»
14 years 9 days ago
A Meet-in-the-Middle Attack on the Full KASUMI
KASUMI is a block cipher which consists eight Feistel rounds with a 128-bit key. The confidentiality and integrity of UMTS, GSM and GPRS mobile communications systems depend heavi...
Keting Jia, Hongbo Yu, Xiaoyun Wang
101
Voted
INFOCOM
2012
IEEE
13 years 3 months ago
FlowSifter: A counting automata approach to layer 7 field extraction for deep flow inspection
Abstract—In this paper, we introduce FlowSifter, a systematic framework for online application protocol field extraction. FlowSifter introduces a new grammar model Counting Regu...
Chad R. Meiners, Eric Norige, Alex X. Liu, Eric To...
94
Voted
VIS
2007
IEEE
125views Visualization» more  VIS 2007»
16 years 1 months ago
High-Quality Multimodal Volume Rendering for Preoperative Planning of Neurosurgical Interventions
Surgical approaches tailored to an individual patient's anatomy and pathology have become standard in neurosurgery. Precise preoperative planning of these procedures, however,...
Johanna Beyer, Markus Hadwiger, Stefan Wolfsberg...
DAC
2003
ACM
16 years 1 months ago
Using estimates from behavioral synthesis tools in compiler-directed design space exploration
This paper considers the role of performance and area estimates from behavioral synthesis in design space exploration. We have developed a compilation system that automatically ma...
Byoungro So, Pedro C. Diniz, Mary W. Hall