Sciweavers

1224 search results - page 117 / 245
» Design and Implementation of a Practical Parallel Delaunay A...
Sort
View
ESA
2006
Springer
130views Algorithms» more  ESA 2006»
15 years 8 months ago
Robust, Generic and Efficient Construction of Envelopes of Surfaces in Three-Dimensional Spaces
Lower envelopes are fundamental structures in computational geometry, which have many applications, such as computing general Voronoi diagrams and performing hidden surface removal...
Michal Meyerovitch
ICDCSW
2007
IEEE
15 years 10 months ago
Survey of Six Myths and Oversights about Distributed Hash Tables' Security
Distributed Hash Tables (DHT) was not designed to be secure against malicious users. But some secure systems like trust and reputation management algorithms trust DHT with their d...
Sylvain Dahan, Mitsuhisa Sato
ICDCS
2009
IEEE
16 years 1 months ago
Centaur: A Hybrid Approach for Reliable Policy-Based Routing
In this paper, we consider the design of a policy-based routing system and the role that link state might play. Looking at the problem from a link-state perspective, we propose Ce...
Xin Zhang, Adrian Perrig, Hui Zhang
ASAP
2008
IEEE
186views Hardware» more  ASAP 2008»
15 years 11 months ago
Accelerating Nussinov RNA secondary structure prediction with systolic arrays on FPGAs
RNA structure prediction, or folding, is a computeintensive task that lies at the core of several search applications in bioinformatics. We begin to address the need for high-thro...
Arpith C. Jacob, Jeremy Buhler, Roger D. Chamberla...
HPCA
1999
IEEE
15 years 8 months ago
A Study of Control Independence in Superscalar Processors
Control independence has been put forward as a significant new source of instruction-level parallelism for future generation processors. However, its performance potential under p...
Eric Rotenberg, Quinn Jacobson, James E. Smith