Sciweavers

261 search results - page 36 / 53
» Efficient Recovery in Harp
Sort
View
SIAMMAX
2010
164views more  SIAMMAX 2010»
13 years 4 months ago
Uniqueness of Low-Rank Matrix Completion by Rigidity Theory
The problem of completing a low-rank matrix from a subset of its entries is often encountered in the analysis of incomplete data sets exhibiting an underlying factor model with app...
Amit Singer, Mihai Cucuringu
CHES
2009
Springer
265views Cryptology» more  CHES 2009»
14 years 10 months ago
Higher-Order Masking and Shuffling for Software Implementations of Block Ciphers
Differential Power Analysis (DPA) is a powerful side channel key recovery attack that efficiently breaks block ciphers implementations. In software, two main techniques are usually...
Matthieu Rivain, Emmanuel Prouff, Julien Doget
HPCA
2007
IEEE
14 years 10 months ago
Evaluating MapReduce for Multi-core and Multiprocessor Systems
This paper evaluates the suitability of the MapReduce model for multi-core and multi-processor systems. MapReduce was created by Google for application development on data-centers...
Colby Ranger, Ramanan Raghuraman, Arun Penmetsa, G...
VTC
2008
IEEE
127views Communications» more  VTC 2008»
14 years 4 months ago
Performance Evaluation of Joint FEC and ARQ Optimization Heuristic Algorithms under Gilbert-Elliot Wireless Channel
— In this paper, we evaluate the performance of adaptive algorithms for selecting the number of redundant packets by jointly considering the forward error correction (FEC) and au...
Azfar Moid, Abraham O. Fapojuwo
IUI
2006
ACM
14 years 3 months ago
Three phase verification for spoken dialog clarification
Spoken dialog tasks incur many errors including speech recognition errors, understanding errors, and even dialog management errors. These errors create a big gap between user'...
Sangkeun Jung, Cheongjae Lee, Gary Geunbae Lee