Sciweavers

24529 search results - page 4878 / 4906
» Computing on Authenticated Data
Sort
View
JPDC
2000
141views more  JPDC 2000»
13 years 9 months ago
A System for Evaluating Performance and Cost of SIMD Array Designs
: SIMD arrays are likely to become increasingly important as coprocessors in domain specific systems as architects continue to leverage RAM technology in their design. The problem ...
Martin C. Herbordt, Jade Cravy, Renoy Sam, Owais K...
JSA
2000
175views more  JSA 2000»
13 years 9 months ago
Complete worst-case execution time analysis of straight-line hard real-time programs
In this article, the problem of finding a tight estimate on the worst-case execution time (WCET) of a real-time program is addressed. The analysis is focused on straight-line code...
Friedhelm Stappert, Peter Altenbernd
MOC
2000
105views more  MOC 2000»
13 years 9 months ago
On the iteratively regularized Gauss-Newton method for solving nonlinear ill-posed problems
The iteratively regularized Gauss-Newton method is applied to compute the stable solutions to nonlinear ill-posed problems F (x) = y when the data y is given approximately by y wit...
Jin Qi-nian
NJC
2000
169views more  NJC 2000»
13 years 9 months ago
A Type System for Bounded Space and Functional In-Place Update
We show how linear typing can be used to obtain functional programs which modify heap-allocated data structures in place. We present this both as a "design pattern" for ...
Martin Hofmann
IJCV
2002
240views more  IJCV 2002»
13 years 9 months ago
Self-Calibration of Rotating and Zooming Cameras
In this paper we describe the theory and practice of self-calibration of cameras which are fixed in location and may freely rotate while changing their internal parameters by zoomi...
Lourdes de Agapito, Eric Hayman, Ian D. Reid
« Prev « First page 4878 / 4906 Last » Next »