Sciweavers

1444 search results - page 123 / 289
» On Variations of Power Iteration
Sort
View
DAC
2007
ACM
14 years 7 days ago
Side-Channel Attack Pitfalls
While cryptographic algorithms are usually strong against mathematical attacks, their practical implementation, both in software and in hardware, opens the door to side-channel at...
Kris Tiri
CVPR
2005
IEEE
14 years 10 months ago
Decentralized Multiple Target Tracking Using Netted Collaborative Autonomous Trackers
This paper presents a decentralized approach to multiple target tracking. The novelty of this approach lies in the use of a set of autonomous while collaborative trackers to overc...
Ting Yu, Ying Wu
DAC
2009
ACM
14 years 9 months ago
Provably good and practically efficient algorithms for CMP dummy fill
Abstract--To reduce chip-scale topography variation in Chemical Mechanical Polishing (CMP) process, dummy fill is widely used to improve the layout density uniformity. Previous res...
Chunyang Feng, Hai Zhou, Changhao Yan, Jun Tao, Xu...
MICCAI
2003
Springer
14 years 9 months ago
Generalized Image Models and Their Application as Statistical Models of Images
A generalized image model (GIM) is presented. Images are represented as sets of four-dimensional (4D) sites combining position and intensity information, as well as their associat...
Miguel Ángel González Ballester, Xav...
HPCA
2006
IEEE
14 years 8 months ago
Construction and use of linear regression models for processor performance analysis
Processor architects have a challenging task of evaluating a large design space consisting of several interacting parameters and optimizations. In order to assist architects in ma...
P. J. Joseph, Kapil Vaswani, Matthew J. Thazhuthav...