Sciweavers

2774 search results - page 420 / 555
» Exploiting Deep Structure
Sort
View
ISLPED
2004
ACM
124views Hardware» more  ISLPED 2004»
15 years 10 months ago
The design of a low power asynchronous multiplier
In this paper we investigate the statistics of multiplier operands and identify two characteristics of their distribution that have important consequences for the design of low po...
Yijun Liu, Stephen B. Furber
136
Voted
MM
2004
ACM
112views Multimedia» more  MM 2004»
15 years 10 months ago
Multi-model similarity propagation and its application for web image retrieval
In this paper, we propose an iterative similarity propagation approach to explore the inter-relationships between Web images and their textual annotations for image retrieval. By ...
Xin-Jing Wang, Wei-Ying Ma, Gui-Rong Xue, Xing Li
SC
2004
ACM
15 years 10 months ago
Big Wins with Small Application-Aware Caches
Large datasets, on the order of GB and TB, are increasingly common as abundant computational resources allow practitioners to collect, produce and store data at higher rates. As d...
Julio C. López, David R. O'Hallaron, Tianka...
130
Voted
ANTSW
2004
Springer
15 years 10 months ago
An Ant Approach to Membership Overlay Design
Designing an optimal overlay communication network for a set of processes on the Internet is a central problem of peer-to-peer (P2P) computing. Such a network defines membership a...
Vittorio Maniezzo, Marco A. Boschetti, Márk...
CARDIS
2004
Springer
97views Hardware» more  CARDIS 2004»
15 years 10 months ago
On the Security of the DeKaRT Primitive
DeKaRT primitives are key-dependent reversible circuits presented at CHES 2003. According to the author, the circuits described are suitable for data scrambling but also as buildin...
Gilles Piret, François-Xavier Standaert, Ga...