Sciweavers

462 search results - page 63 / 93
» Parallel algorithm for hardware implementation of inverse ha...
Sort
View
84
Voted
TC
2008
14 years 9 months ago
Cryptanalysis with COPACOBANA
Cryptanalysis of ciphers usually involves massive computations. The security parameters of cryptographic algorithms are commonly chosen so that attacks are infeasible with availabl...
Tim Güneysu, Timo Kasper, Martin Novotn&yacut...
SPIN
2007
Springer
15 years 3 months ago
Scalable Multi-core LTL Model-Checking
Recent development in computer hardware has brought more wide-spread emergence of shared-memory, multi-core systems. These architectures offer opportunities to speed up various ta...
Jiri Barnat, Lubos Brim, Petr Rockai
FPL
2004
Springer
101views Hardware» more  FPL 2004»
15 years 3 months ago
The Chess Monster Hydra
Abstract. With the help of the FPGA technology, the boarder between hardand software has vanished. It is now possible to develop complex designs and fine grained parallel applicat...
Chrilly Donninger, Ulf Lorenz
IPPS
2006
IEEE
15 years 3 months ago
Acceleration of a content-based image-retrieval application on the RDISK cluster
Because of the growing use of multimedia content over Internet, Content-Based Image Retrieval (CBIR) has recently received a lot of interest. While accurate search techniques base...
Auguste Noumsi, Steven Derrien, Patrice Quinton
ICVGIP
2008
14 years 11 months ago
Fast, Processor-Cardinality Agnostic PRNG with a Tracking Application
As vision algorithms mature with increasing inspiration from the learning community, statistically independent pseudo random number generation (PRNG) becomes increasingly importan...
Andrew Janowczyk, Sharat Chandran, Srinivas Aluru