Sciweavers

2192 search results - page 312 / 439
» Embedded function composition
Sort
View
ICIP
2001
IEEE
14 years 12 months ago
Synthesis and applications of lattice image operators based on fuzzy norms
In this paper we use concepts from the lattice-based theory of morphological operators and fuzzy sets to develop generalized lattice image operators that can be expressed as nonli...
Petros Maragos, Vassilis Tzouvaras, Giorgos B. Sta...
CHES
2009
Springer
200views Cryptology» more  CHES 2009»
14 years 10 months ago
Accelerating AES with Vector Permute Instructions
We demonstrate new techniques to speed up the Rijndael (AES) block cipher using vector permute instructions. Because these techniques avoid data- and key-dependent branches and mem...
Mike Hamburg
KDD
2006
ACM
157views Data Mining» more  KDD 2006»
14 years 10 months ago
Using structure indices for efficient approximation of network properties
Statistics on networks have become vital to the study of relational data drawn from areas such as bibliometrics, fraud detection, bioinformatics, and the Internet. Calculating man...
Matthew J. Rattigan, Marc Maier, David Jensen
SIGMOD
2003
ACM
115views Database» more  SIGMOD 2003»
14 years 10 months ago
Querying Structured Text in an XML Database
XML databases often contain documents comprising structured text. Therefore, it is important to integrate "information retrieval style" query evaluation, which is well-s...
Shurug Al-Khalifa, Cong Yu, H. V. Jagadish
ICFP
2001
ACM
14 years 10 months ago
Macros as Multi-Stage Computations: Type-Safe, Generative, Binding Macros in MacroML
With few exceptions, macros have traditionally been viewed as operations on syntax trees or even on plain strings. This view makes macros seem ad hoc, and is at odds with two desi...
Steven E. Ganz, Amr Sabry, Walid Taha