Sciweavers

2035 search results - page 136 / 407
» Working memory
Sort
View
FSE
2010
Springer
132views Cryptology» more  FSE 2010»
15 years 8 months ago
Rebound Attack on Reduced-Round Versions of JH
Abstract. JH, designed by Wu, is one of the 14 second round candidates in the NIST Hash Competition. This paper presents the first analysis results of JH by using rebound attack. ...
Vincent Rijmen, Deniz Toz, Kerem Varici
ASPDAC
2009
ACM
124views Hardware» more  ASPDAC 2009»
15 years 8 months ago
Thermal optimization in multi-granularity multi-core floorplanning
—Multi-core microarchitectures require a careful balance between many competing objectives to achieve the highest possible performance. Integrated Early Analysis is the considera...
Michael B. Healy, Hsien-Hsin S. Lee, Gabriel H. Lo...
167
Voted
ICDCS
1997
IEEE
15 years 7 months ago
Multi-threading and Remote Latency in Software DSMs
This paper evaluates the use of per-node multi-threading to hide remote memory and synchronization latencies in a software DSM. As with hardware systems, multi-threading in softwa...
Kritchalach Thitikamol, Peter J. Keleher
119
Voted
CIKM
2006
Springer
15 years 7 months ago
Resource-aware kernel density estimators over streaming data
A fundamental building block of many data mining and analysis approaches is density estimation as it provides a comprehensive statistical model of a data distribution. For that re...
Christoph Heinz, Bernhard Seeger
SC
1991
ACM
15 years 6 months ago
Alleviation of tree saturation in multistage interconnection networks
This paper presents an examination of two distinct but complementary extensions of previous work on hot spot contention in multistage interconnection networks. The first extensio...
Matthew K. Farrens, Brad Wetmore, Allison Woodruff