Sciweavers

5344 search results - page 219 / 1069
» Privacy-Preserving Set Operations
Sort
View
90
Voted
ISCIS
2003
Springer
15 years 8 months ago
POCS-Based Enhancement of De-interlaced Video
Abstract. To convert an interlaced video into a progressive one effectively, de-interlacing techniques have been developed. However, existing de-interlacing techniques can not per...
Kang-Sun Choi, Jun-Ki Cho, Min-Cheol Hwang, Sung-J...
140
Voted
ICCS
2001
Springer
15 years 8 months ago
Optimizing Sparse Matrix Computations for Register Reuse in SPARSITY
Abstract. Sparse matrix-vector multiplication is an important computational kernel that tends to perform poorly on modern processors, largely because of its high ratio of memory op...
Eun-Jin Im, Katherine A. Yelick
149
Voted
ICECCS
1998
IEEE
161views Hardware» more  ICECCS 1998»
15 years 7 months ago
A Method and a Technique to Model and Ensure Timeliness in Safety Critical Real-Time Systems
The main focus of this paper is the problem of ensuring timeliness in safety critical systems. First, we introduce a method and its associated technique to model both real-time ta...
Christophe Aussaguès, Vincent David
114
Voted
ANTS
2006
Springer
78views Algorithms» more  ANTS 2006»
15 years 7 months ago
Hidden Pairings and Trapdoor DDH Groups
This paper suggests a new building block for cryptographic protocols and gives two instantiations of it. The concept is to generate two descriptions of the same group: a public des...
Alexander W. Dent, Steven D. Galbraith
127
Voted
ENC
2004
IEEE
15 years 7 months ago
Continuous Mode Changes in Mechatronic Systems
This paper deals with the problem of controlling highly dynamic mechatronic systems. Such systems may work in several different operation modes, or even underlie continuous mode c...
Klaus Ecker, Andrei Tchernykh, Frank Drews, Silke ...