Sciweavers

1585 search results - page 94 / 317
» Automatically optimizing secure computation
Sort
View
CLUSTER
2008
IEEE
14 years 2 months ago
A comparison of search heuristics for empirical code optimization
—This paper describes the application of various search techniques to the problem of automatic empirical code optimization. The search process is a critical aspect of auto-tuning...
Keith Seymour, Haihang You, Jack Dongarra
IPPS
1999
IEEE
14 years 8 days ago
Optimally Scaling Permutation Routing on Reconfigurable Linear Arrays with Optical Buses
We present an optimal and scalable permutation routing algorithm for three reconfigurable models based on linear arrays that allow pipelining of information through an optical bus...
Jerry L. Trahan, Anu G. Bourgeois, Ramachandran Va...
WSCG
2003
223views more  WSCG 2003»
13 years 9 months ago
Optimizing Parameters of a Motion Detection System by Means of a Genetic Algorithm
Visual surveillance and monitoring have aroused interest in the computer video community for many years. The main task of these applications is to identify (and track) moving targ...
Alessandro Bevilacqua
MHCI
2009
Springer
14 years 2 months ago
Optimizing user interaction for mobile web browsing
The small form-factor of mobile handsets and the longer, variable latency of cellular networks negatively affect user experience in mobile web related activities. In this paper we...
Dong Zhou, Ajay Chander, Hiroshi Inamura
FSE
2006
Springer
104views Cryptology» more  FSE 2006»
13 years 11 months ago
Chosen-Ciphertext Attacks Against MOSQUITO
Self-Synchronizing Stream Ciphers (SSSC) are a particular class of symmetric encryption algorithms, such that the resynchronization is automatic, in case of error during the transm...
Antoine Joux, Frédéric Muller