Sciweavers

2620 search results - page 392 / 524
» Efficient Hardware Voxelization
Sort
View
IJNSEC
2006
94views more  IJNSEC 2006»
15 years 4 months ago
A Binary Redundant Scalar Point Multiplication in Secure Elliptic Curve Cryptosystems
The main back-bone operation in elliptic curve cryptosystems is scalar point multiplication. The most frequently used method implementing the scalar point multiplication which is ...
Sangook Moon
157
Voted
TVCG
2008
144views more  TVCG 2008»
15 years 4 months ago
Spherical Piecewise Constant Basis Functions for All-Frequency Precomputed Radiance Transfer
This paper presents a novel basis function, called spherical piecewise constant basis function (SPCBF), for precomputed radiance transfer. SPCBFs have several desirable properties:...
Kun Xu, Yun-Tao Jia, Hongbo Fu, Shi-Min Hu, Chiew-...
APIN
1999
107views more  APIN 1999»
15 years 4 months ago
Massively Parallel Probabilistic Reasoning with Boltzmann Machines
We present a method for mapping a given Bayesian network to a Boltzmann machine architecture, in the sense that the the updating process of the resulting Boltzmann machine model pr...
Petri Myllymäki
140
Voted
CORR
2010
Springer
159views Education» more  CORR 2010»
15 years 4 months ago
A Novel VLSI Architecture of Fixed-complexity Sphere Decoder
Fixed-complexity sphere decoder (FSD) is a recently proposed technique for multiple-input multiple-output (MIMO) detection. It has several outstanding features such as constant thr...
Bin Wu, Guido Masera
NETWORK
2007
100views more  NETWORK 2007»
15 years 4 months ago
Parallel Programmable Ethernet Controllers: Performance and Security
Programmable network interfaces can provide network servers with a flexible interface to high-bandwidth Ethernet links, but they face critical software and architectural challenge...
Derek L. Schuff, Vijay S. Pai, Paul Willmann, Scot...