Sciweavers

998 search results - page 90 / 200
» From Feasible Proofs to Feasible Computations
Sort
View
CASES
2004
ACM
14 years 2 months ago
Safely exploiting multithreaded processors to tolerate memory latency in real-time systems
A coarse-grain multithreaded processor can effectively hide long memory latencies by quickly switching to an alternate task when the active task issues a memory request, improving...
Ali El-Haj-Mahmoud, Eric Rotenberg
ACISP
2006
Springer
14 years 20 days ago
Online/Offline Signatures and Multisignatures for AODV and DSR Routing Security
Efficient authentication is one of important security requirements in mobile ad hoc network (MANET) routing systems. The techniques of digital signatures are generally considered a...
Shidi Xu, Yi Mu, Willy Susilo
CVPR
2001
IEEE
14 years 11 months ago
Non-Metric Image-Based Rendering for Video Stabilization
We consider the problem of video stabilization: removing unwanted image perturbations due to unstable camera motions. We approach this problem from an image-based rendering (IBR) ...
Chris Buehler, Michael Bosse, Leonard McMillan
ECCV
2008
Springer
14 years 10 months ago
Output Regularized Metric Learning with Side Information
Distance metric learning has been widely investigated in machine learning and information retrieval. In this paper, we study a particular content-based image retrieval application ...
Wei Liu, Steven C. H. Hoi, Jianzhuang Liu
ASAP
2009
IEEE
143views Hardware» more  ASAP 2009»
14 years 6 months ago
Scalar Processing Overhead on SIMD-Only Architectures
—The Cell processor consists of a general-purpose core and eight cores with a complete SIMD instruction set. Although originally designed for multimedia and gaming, it is current...
Arnaldo Azevedo Filho, Ben H. H. Juurlink