Sciweavers

468 search results - page 79 / 94
» Optimization of in-network data reduction
Sort
View
ISM
2005
IEEE
103views Multimedia» more  ISM 2005»
14 years 3 months ago
A Dynamic Programming Approach to Adaptive Tatum Assignment for Rhythm Transcription
—We present a method for segmenting music with different grid levels in order to properly quantize note values in the transcription of music. This method can be used in automatic...
Aaron Yang, Elaine Chew, Anja Volk
ESTIMEDIA
2005
Springer
14 years 3 months ago
Scratchpad Sharing Strategies for Multiprocess Embedded Systems: A First Approach
Portable embedded systems require diligence in managing their energy consumption. Thus, power efficient processors coupled with onchip memories (e.g. caches, scratchpads) are the...
Manish Verma, Klaus Petzold, Lars Wehmeyer, Heiko ...
LCTRTS
2005
Springer
14 years 3 months ago
A dictionary construction technique for code compression systems with echo instructions
Dictionary compression mechanisms identify redundant sequences of instructions that occur in a program. The sequences are extracted and copied to a dictionary. Each sequence is th...
Philip Brisk, Jamie Macbeth, Ani Nahapetian, Majid...
PADS
2004
ACM
14 years 3 months ago
Conservative Synchronization of Large-Scale Network Simulations
Parallel discrete event simulation techniques have enabled the realization of large-scale models of communication networks containing millions of end hosts and routers. However, t...
Alfred Park, Richard M. Fujimoto, Kalyan S. Peruma...
CHES
2003
Springer
100views Cryptology» more  CHES 2003»
14 years 3 months ago
Multi-channel Attacks
We introduce multi-channel attacks, i.e., side-channel attacks which utilize multiple side-channels such as power and EM simultaneously. We propose an adversarial model which combi...
Dakshi Agrawal, Josyula R. Rao, Pankaj Rohatgi