Sciweavers

377 search results - page 26 / 76
» Distributed computation under bit constraints
Sort
View
IPPS
2008
IEEE
14 years 2 months ago
What is the best way to prove a cryptographic protocol correct?
In this paper, we identify that protocol verification using invariants have significant limitations such as inapplicability to some protocols, non-standard attacker inferences a...
Sreekanth Malladi, Gurdeep S. Hura
ICCAD
2003
IEEE
221views Hardware» more  ICCAD 2003»
14 years 4 months ago
Combined Dynamic Voltage Scaling and Adaptive Body Biasing for Heterogeneous Distributed Real-time Embedded Systems
Abstract— Dynamic voltage scaling (DVS) is a powerful technique for reducing dynamic power consumption in a computing system. However, as technology feature size continues to sca...
Le Yan, Jiong Luo, Niraj K. Jha
HPCA
2008
IEEE
14 years 8 months ago
Fundamental performance constraints in horizontal fusion of in-order cores
A conceptually appealing approach to supporting a broad range of workloads is a system comprising many small cores that can be fused, on demand, into larger cores. We demonstrate ...
Pierre Salverda, Craig B. Zilles
MICCAI
2010
Springer
13 years 5 months ago
Symmetric Positive-Definite Cartesian Tensor Orientation Distribution Functions (CT-ODF)
Abstract. A novel method for estimating a field of orientation distribution functions (ODF) from a given set of DW-MR images is presented. We model the ODF by Cartesian tensor basi...
Yonas T. Weldeselassie, Angelos Barmpoutis, M. Ste...
CCGRID
2008
IEEE
14 years 2 months ago
Modeling "Just-in-Time" Communication in Distributed Real-Time Multimedia Applications
—The research area of Multimedia Content Analysis (MMCA) considers all aspects of the automated extraction of new knowledge from large multimedia data streams and archives. In re...
R. Yang, Robert D. van der Mei, D. Roubos, Frank J...