Sciweavers

8080 search results - page 1609 / 1616
» Distributed Constrained Optimization
Sort
View
DCC
2011
IEEE
13 years 3 months ago
Robust Learning of 2-D Separable Transforms for Next-Generation Video Coding
With the simplicity of its application together with compression efficiency, the Discrete Cosine Transform(DCT) plays a vital role in the development of video compression standar...
Osman Gokhan Sezer, Robert A. Cohen, Anthony Vetro
CORR
2011
Springer
143views Education» more  CORR 2011»
13 years 15 days ago
Non-malleable extractors via character sums
In studying how to communicate over a public channel with an active adversary, Dodis and Wichs introduced the notion of a non-malleable extractor. A non-malleable extractor dramat...
Trevor D. Wooley, David Zuckerman
ISCA
2011
IEEE
294views Hardware» more  ISCA 2011»
13 years 12 days ago
Moguls: a model to explore the memory hierarchy for bandwidth improvements
In recent years, the increasing number of processor cores and limited increases in main memory bandwidth have led to the problem of the bandwidth wall, where memory bandwidth is b...
Guangyu Sun, Christopher J. Hughes, Changkyu Kim, ...
ISCA
2011
IEEE
238views Hardware» more  ISCA 2011»
13 years 12 days ago
Rebound: scalable checkpointing for coherent shared memory
As we move to large manycores, the hardware-based global checkpointing schemes that have been proposed for small shared-memory machines do not scale. Scalability barriers include ...
Rishi Agarwal, Pranav Garg, Josep Torrellas
ISCA
2011
IEEE
269views Hardware» more  ISCA 2011»
13 years 12 days ago
Crafting a usable microkernel, processor, and I/O system with strict and provable information flow security
High assurance systems used in avionics, medical implants, and cryptographic devices often rely on a small trusted base of hardware and software to manage the rest of the system. ...
Mohit Tiwari, Jason Oberg, Xun Li 0001, Jonathan V...
« Prev « First page 1609 / 1616 Last » Next »