Sciweavers

221 search results - page 29 / 45
» isca 2008
Sort
View
ISCAS
2008
IEEE
230views Hardware» more  ISCAS 2008»
15 years 4 months ago
Joint optimization of data hiding and video compression
— From copyright protection to error concealment, video data hiding has found usage in a great number of applications. Recently proposed applications such as privacy data preserv...
Jithendra K. Paruchuri, Sen-Ching S. Cheung
ISCA
2008
IEEE
205views Hardware» more  ISCA 2008»
15 years 4 months ago
VEAL: Virtualized Execution Accelerator for Loops
Performance improvement solely through transistor scaling is becoming more and more difficult, thus it is increasingly common to see domain specific accelerators used in conjunc...
Nathan Clark, Amir Hormati, Scott A. Mahlke
ISCAS
2008
IEEE
195views Hardware» more  ISCAS 2008»
15 years 4 months ago
Multi-view depth video coding using depth view synthesis
— Depth information indicates the distance of an object in the three dimensional (3D) scene from the camera view-point, typically represented by eight bits. Since the depth map i...
Sang-Tae Na, Kwan-Jung Oh, Cheon Lee, Yo-Sung Ho
ISCAS
2008
IEEE
110views Hardware» more  ISCAS 2008»
15 years 4 months ago
Non-traditional irregular interconnects for massive scale SoC
— By using self-assembling fabrication techniques at the cellular, molecular, or atomic scale, it is nowadays possible to create functional assemblies in a mainly bottom-up way t...
Christof Teuscher, Anders A. Hansson
ISCA
2008
IEEE
136views Hardware» more  ISCA 2008»
14 years 10 months ago
A Randomized Queueless Algorithm for Breadth-First Search
First Come First Served is a policy that is accepted for implementing fairness in a number of application domains such as scheduling in Operating Systems [28, 11], scheduling web ...
K. Subramani, Kamesh Madduri