Sciweavers

4330 search results - page 763 / 866
» Analyzing security architectures
Sort
View
111
Voted
ICA3PP
2009
Springer
15 years 8 months ago
A Software Transactional Memory Service for Grids
In-memory data sharing for grids allow location-transparent access to data stored in volatile memory. Existing Grid middlewares typ- ically support only explicit data transfer betw...
Kim-Thomas Möller, Marc-Florian Müller, ...
106
Voted
ICS
2009
Tsinghua U.
15 years 8 months ago
Single-particle 3d reconstruction from cryo-electron microscopy images on GPU
Single-particle 3D reconstruction from cryo-electron microscopy (cryo-EM) images is a kernel application of biological molecules analysis, as the computational requirement of whic...
Guangming Tan, Ziyu Guo, Mingyu Chen, Dan Meng
DATE
2000
IEEE
108views Hardware» more  DATE 2000»
15 years 8 months ago
A 50 Mbit/s Iterative Turbo-Decoder
Very low bit error rate has become an important constraint in high performance communication systems that operate at very low signal to noise ratios: due to their impressive codin...
F. Viglione, Guido Masera, Gianluca Piccinini, Mas...
111
Voted
VISUALIZATION
2000
IEEE
15 years 8 months ago
Achieving color uniformity across multi-projector displays
Large area tiled displays are gaining popularity for use in collaborative immersive virtual environments and scientific visualization. While recent work has addressed the issues ...
Aditi Majumder, Zhu He, Herman Towles, Greg Welch
126
Voted
FCCM
1999
IEEE
122views VLSI» more  FCCM 1999»
15 years 8 months ago
Safe and Protected Execution for the Morph/AMRM Reconfigurable Processor
Technology scaling of CMOS processes brings relatively faster transistors (gates) and slower interconnects (wires), making viable the addition of reconfigurability to increase per...
Andrew A. Chien, Jay H. Byun