Sciweavers

6897 search results - page 1187 / 1380
» Parallelization of Modular Algorithms
Sort
View
DAC
2007
ACM
16 years 6 months ago
Compact State Machines for High Performance Pattern Matching
Pattern matching is essential to a wide range of applications such as network intrusion detection, virus scanning, etc. Pattern matching algorithms normally rely on state machines...
Piti Piyachon, Yan Luo
126
Voted
ISBI
2008
IEEE
16 years 5 months ago
Fast nonlocal filtering applied to electron cryomicroscopy
We present an efficient algorithm for nonlocal image filtering with applications in electron cryomicroscopy. Our denoising algorithm is a rewriting of the recently proposed nonloc...
Alexandre Cunha, Grant J. Jensen, Jérô...
ASPLOS
2009
ACM
16 years 5 months ago
Optimization of tele-immersion codes
As computational power increases, tele-immersive applications are an emerging trend. These applications make extensive demands on computational resources through their heavy use o...
Albert Sidelnik, I-Jui Sung, Wanmin Wu, Marí...
STOC
2009
ACM
91views Algorithms» more  STOC 2009»
16 years 5 months ago
Inaccessible entropy
We put forth a new computational notion of entropy, which measures the (in)feasibility of sampling high entropy strings that are consistent with a given protocol. Specifically, we...
Iftach Haitner, Omer Reingold, Salil P. Vadhan, Ho...
CHES
2009
Springer
157views Cryptology» more  CHES 2009»
16 years 5 months ago
Differential Cluster Analysis
Abstract. We propose a new technique called Differential Cluster Analysis for side-channel key recovery attacks. This technique uses cluster analysis to detect internal collisions ...
Lejla Batina, Benedikt Gierlichs, Kerstin Lemke-Ru...
« Prev « First page 1187 / 1380 Last » Next »