Sciweavers

106 search results - page 16 / 22
» Multiple Branch and Block Prediction
Sort
View
ACSAC
2005
IEEE
14 years 1 months ago
Defensive Execution of Transactional Processes against Attacks
It is a well known problem that the attack recovery of a self-healing system rolls back not only malicious transactions, but also legitimate transactions that are dependent on the...
Meng Yu, Wanyu Zang, Peng Liu
CSB
2005
IEEE
145views Bioinformatics» more  CSB 2005»
14 years 1 months ago
Classification Methods for HIV-1 Medicated Neuronal Damage
HIV-1-associated dementia (HAD) is the most devastating disease happened in the central nervous system of AIDS patients. Neuronal damage, the early indicator of HAD, under differe...
Mengjun Wang, Jialin Zheng, Zhengxin Chen, Yong Sh...
ISQED
2010
IEEE
156views Hardware» more  ISQED 2010»
13 years 9 months ago
On the design of different concurrent EDC schemes for S-Box and GF(p)
Recent studies have shown that an attacker can retrieve confidential information from cryptographic hardware (e.g. the secret key) by introducing internal faults. A secure and re...
Jimson Mathew, Hafizur Rahaman, Abusaleh M. Jabir,...
ISCAS
2005
IEEE
209views Hardware» more  ISCAS 2005»
14 years 1 months ago
Low complexity H.263 to H.264 video transcoding using motion vector decomposition
The H.264 adopts various block types and multiple reference frames for motion compensation. For transcoding a video sequence from the H.263 format to the H.264 format, it is benef...
Kai-Tat Fung, Wan-Chi Siu
ICMCS
2005
IEEE
90views Multimedia» more  ICMCS 2005»
14 years 1 months ago
A spatial-temporal de-interlacing algorithm
In this paper, we proposed a spatial-temporal de-interlacing algorithm for conversion of interlaced video to progressive video. Our proposed algorithm estimates the motion traject...
Tak-Song Chong, Oscar C. Au, Tai-Wai Chan, Wing-Sa...