Abstract: Research in the field of academic teaching and life focuses on the integration of recent technologies. Additionally, new trends within the current usage of e.g. the Inter...
Michael Wittke, Sven Tomforde, Yaser Chaaban, J&uu...
Nearly 70% of information security threats originate from inside the organization. The instances of insider threats have been increasing at an alarming rate with the latest trends ...
Logarithmic shadow maps can deliver the same quality as competing shadow map algorithms with substantially less storage and bandwidth. We show how current GPU architectures can be...
Brandon Lloyd, Naga K. Govindaraju, Steven E. Moln...
Recently, graphics hardware architectures have begun to emphasize versatility, offering rich new ways to programmatically reconfigure the graphics pipeline. In this paper, we exp...
Interconnect has become the dominating factor in determining circuit performance and reliability in deep submicron designs. In this embedded tutorial, we first discuss the trends...
Jason Cong, David Zhigang Pan, Lei He, Cheng-Kok K...