Sciweavers

1198 search results - page 196 / 240
» Compiling for EDGE Architectures
Sort
View
CCS
2008
ACM
13 years 11 months ago
Robust, anonymous RFID authentication with constant key-lookup
A considerable number of anonymous RFID authentication schemes have been proposed. However, current proposals either do not provide robust security guarantees, or suffer from scal...
Mike Burmester, Breno de Medeiros, Rossana Motta
ECOOP
2008
Springer
13 years 11 months ago
Liquid Metal: Object-Oriented Programming Across the Hardware/Software Boundary
Abstract. The paradigm shift in processor design from monolithic processors to multicore has renewed interest in programming models that facilitate parallelism. While multicores ar...
Shan Shan Huang, Amir Hormati, David F. Bacon, Rod...
SIMUTOOLS
2008
13 years 11 months ago
Implementing MAC protocols for cooperative relaying: a compiler-assisted approach
Evaluating the performance of a cooperative relaying protocol requires an implementation for simulators and/or software-defined radios (SDRs) with an appropriate model for error d...
Hermann S. Lichte, Stefan Valentin
VMV
2004
183views Visualization» more  VMV 2004»
13 years 11 months ago
CGiS, a new Language for Data-parallel GPU Programming
In the last few years, GPUs have become new, promising targets for general purpose programming. Their inherent parallel architecture makes them particularly suited for scientific ...
Nicolas Fritz, Philipp Lucas, Philipp Slusallek
ACL
1998
13 years 11 months ago
Integration of Large-Scale Linguistic Resources in a Natural Language Understanding System
Knowledge acquisition is a serious bottleneck for natural language understanding systems. For this reason, large-scale linguistic resources have been compiled and made available b...
Lewis M. Norton, Deborah A. Dahl, Li Li, Katharine...