Sciweavers

872 search results - page 73 / 175
» A Leakage-Resilient Mode of Operation
Sort
View
VLDB
1990
ACM
77views Database» more  VLDB 1990»
13 years 11 months ago
Efficient Main Memory Data Management Using the DBGraph Storage Model
Therequirementsfor amain memorydatastoragemodel are both compactnessand efficient processing for all database operations. The DBGraph storage model, proposed in this paper, achiev...
Philippe Pucheral, Jean-Marc Thévenin, Patr...
3DPVT
2004
IEEE
104views Visualization» more  3DPVT 2004»
13 years 11 months ago
Interactive Modeling from Dense Color and Sparse Depth
We are developing a system for interactive modeling of real world scenes. The acquisition device consists of a video camera enhanced with an attached laser system. As the operator...
Voicu Popescu, Elisha Sacks, Gleb Bahmutov
CLUSTER
2004
IEEE
13 years 11 months ago
On optimizing collective communication
In this paper we discuss issues related to the highperformance implementation of collective communications operations on distributed-memory computer architectures. Using a combina...
E. W. Chan, M. F. Heimlich, Avi Purkayastha, Rober...
FPL
2008
Springer
91views Hardware» more  FPL 2008»
13 years 9 months ago
Power efficient DSP datapath configuration methodology for FPGA
Exploiting the underutilisation of variable-length DSP algorithms during normal operation is vital, when seeking to maximise the achievable functionality of an application within ...
Stephen McKeown, Roger Woods, John McAllister
GECCO
2008
Springer
196views Optimization» more  GECCO 2008»
13 years 8 months ago
A fuzzy-genetic approach to network intrusion detection
Computer networks have expanded significantly in use and numbers. This expansion makes them more vulnerable to attack by malicious agents. Many current intrusion detection systems...
Terrence P. Fries