Sciweavers

819 search results - page 128 / 164
» A Technique for Combined Virtual Prototyping and Hardware De...
Sort
View
IH
2001
Springer
14 years 9 days ago
Keyless Public Watermarking for Intellectual Property Authentication
Abstract. A constraint-based watermarking technique has been introduced for the protection of intellectual properties such as hardware, software, algorithms, and solutions to hard ...
Gang Qu
FDG
2009
ACM
14 years 2 months ago
Exertion in networked games
Physical play familiar from sports activities is a favorite pastime across all cultures and has been attributed with many social, mental and physical health benefits. However, the...
Florian Mueller
ISPASS
2009
IEEE
14 years 2 months ago
Analyzing CUDA workloads using a detailed GPU simulator
Modern Graphic Processing Units (GPUs) provide sufficiently flexible programming models that understanding their performance can provide insight in designing tomorrow’s manyco...
Ali Bakhoda, George L. Yuan, Wilson W. L. Fung, He...
AFRIGRAPH
2004
ACM
14 years 1 months ago
Visualizing 3D scenes using non-linear projections and data mining of previous camera movements
We describe techniques for exploring 3D scenes by combining non-linear projections with the interactive data mining of camera navigations from previous explorations. Our approach ...
Karan Singh, Ravin Balakrishnan
HPCN
2000
Springer
13 years 11 months ago
A Java-Based Parallel Programming Support Environment
The Java programming language and environment is stimulating new research activities in many areas of computing, not the least of which is parallel computing. Parallel techniques ...
Kenneth A. Hawick, Heath A. James