Sciweavers

1079 search results - page 50 / 216
» An Implementation of an Address Generator Using Hash Memorie...
Sort
View
IPPS
2002
IEEE
14 years 2 months ago
Next Generation System Software for Future High-End Computing Systems
Future high-end computers will offer great performance improvements over today’s machines, enabling applications of far greater complexity. However, designers must solve the cha...
Guang R. Gao, Kevin B. Theobald, Ziang Hu, Haiping...
ESA
2006
Springer
82views Algorithms» more  ESA 2006»
14 years 22 days ago
The Price of Resiliency: A Case Study on Sorting with Memory Faults
We address the problem of sorting in the presence of faults that may arbitrarily corrupt memory locations, and investigate the impact of memory faults both on the correctness and ...
Umberto Ferraro Petrillo, Irene Finocchi, Giuseppe...
IACR
2011
94views more  IACR 2011»
12 years 8 months ago
After-the-Fact Leakage in Public-Key Encryption
What does it mean for an encryption scheme to be leakage-resilient? Prior formulations require that the scheme remains semantically secure even in the presence of leakage, but onl...
Shai Halevi, Huijia Lin
ECCV
2008
Springer
14 years 11 months ago
Online Tracking and Reacquisition Using Co-trained Generative and Discriminative Trackers
Visual tracking is a challenging problem, as an object may change its appearance due to viewpoint variations, illumination changes, and occlusion. Also, an object may leave the fie...
Gérard G. Medioni, Qian Yu, Thang Ba Dinh
APCSAC
2003
IEEE
14 years 2 months ago
User-Level Management of Kernel Memory
Abstract. Kernel memory is a resource that must be managed carefully in order to ensure the efficiency and safety of the system. The use of an inappropriate management policy can w...
Andreas Haeberlen, Kevin Elphinstone