Sciweavers

2231 search results - page 40 / 447
» Hierarchical back-face computation
Sort
View
IACR
2011
128views more  IACR 2011»
14 years 3 months ago
Identity-Based Cryptography for Cloud Security
—Cloud computing is a style of computing in which dynamically scalable and commonly virtualized resources are provided as a service over the Internet. This paper, first presents ...
Hongwei Li, Yuanshun Dai, Bo Yang
AIM
1998
15 years 3 months ago
Computer Bridge - A Big Win for AI Planning
A computer program that uses AI planning techniques is now the world’s best program for the game of contract bridge. As reported in The New York Times and The Washington Post, t...
Stephen J. J. Smith, Dana S. Nau, Thomas A. Throop
PC
2007
112views Management» more  PC 2007»
15 years 3 months ago
Service address routing: a network-embedded resource management layer for cluster computing
Service address routing is introduced as a novel and powerful paradigm for the integration of resource management functions into the interconnection fabric of cluster computers. S...
Isaac D. Scherson, Daniel S. Valencia, Enrique Cau...
ERSA
2010
119views Hardware» more  ERSA 2010»
15 years 2 months ago
Performance Visualization and Exploration for Reconfigurable Computing Applications
Reconfigurable computing (RC) applications have the potential for significant performance while consuming little power. Although runtime performance analysis of RC applications has...
Seth Koehler, Alan D. George
DATE
2010
IEEE
174views Hardware» more  DATE 2010»
15 years 2 months ago
An HVS-based Adaptive Computational Complexity Reduction Scheme for H.264/AVC video encoder using Prognostic Early Mode Exclusio
The H.264/AVC video encoder standard significantly improves the compression efficiency by using variable block-sized Inter (P) and Intra (I) Macroblock (MB) coding modes. In this p...
Muhammad Shafique, Bastian Molkenthin, Jörg H...