Sciweavers

1494 search results - page 229 / 299
» Efficient provenance storage
Sort
View
ARITH
2009
IEEE
14 years 4 months ago
Fully Redundant Decimal Arithmetic
Hardware implementation of all the basic radix-10 arithmetic operations is evolving as a new trend in the design and implementation of general purpose digital processors. Redundan...
Saeid Gorgin, Ghassem Jaberipur
CHI
2009
ACM
14 years 4 months ago
Understanding knowledge management practices for early design activity and its implications for reuse
Prior knowledge is a critical resource for design, especially when designers are striving to generate new ideas for complex problems. Systems that improve access to relevant prior...
Moushumi Sharmin, Brian P. Bailey, Cole Coats, Kev...
MM
2009
ACM
138views Multimedia» more  MM 2009»
14 years 4 months ago
WOW: wild-open warning for broadcast basketball video based on player trajectory
In basketball games, wild-open means that there is an offensive player not well defended by his/her opponents. The occurrence of wild-open usually implies the existence of a succe...
Ming-Hsiu Chang, Ming-Chun Tien, Ja-Ling Wu
RECONFIG
2008
IEEE
268views VLSI» more  RECONFIG 2008»
14 years 4 months ago
Parametric, Secure and Compact Implementation of RSA on FPGA
1 We present a fast, efficient, and parameterized modular multiplier and a secure exponentiation circuit especially intended for FPGAs on the low end of the price range. The desig...
Ersin Oksuzoglu, Erkay Savas
SISAP
2008
IEEE
188views Data Mining» more  SISAP 2008»
14 years 4 months ago
High-Dimensional Similarity Retrieval Using Dimensional Choice
There are several pieces of information that can be utilized in order to improve the efficiency of similarity searches on high-dimensional data. The most commonly used information...
Dave Tahmoush, Hanan Samet