Sciweavers

2961 search results - page 444 / 593
» Optimization of tele-immersion codes
Sort
View
107
Voted
ICC
2007
IEEE
15 years 10 months ago
Turbo Multiuser Detection Based on Local Search Algorithms
—The full-complexity soft-input/soft-output (SISO) multiuser detector based on the a posteriori probability (APP) algorithm has a computational complexity growing exponentially w...
Zhiliang Qin, Kui Cai, Xiaoxin Zou
127
Voted
ICMCS
2007
IEEE
137views Multimedia» more  ICMCS 2007»
15 years 10 months ago
RD-Optimized Rate Shaping for Multiple Scalable Video Streams
Delivering streaming video over wired and wireless networks poses many challenges, primarily due to the throughput variations caused by time-varying network conditions. Scalable v...
Rajyalakshmi Mahalingam, Wei Tu, Eckehard G. Stein...
123
Voted
ICPP
2007
IEEE
15 years 10 months ago
An Effective Strategy for Porting C++ Applications on Cell
In this paper we present a solution for efficient porting of sequential C++ applications on the Cell B.E. processor. We present our step-by-step approach, focusing on its general...
Ana Lucia Varbanescu, Henk J. Sips, Kenneth A. Ros...
135
Voted
IPPS
2007
IEEE
15 years 10 months ago
A global address space framework for locality aware scheduling of block-sparse computations
In this paper, we present a mechanism for automatic management of the memory hierarchy, including secondary storage, in the context of a global address space parallel programming ...
Sriram Krishnamoorthy, Ümit V. Çataly&...
113
Voted
CTRSA
2007
Springer
110views Cryptology» more  CTRSA 2007»
15 years 10 months ago
Selecting Secure Passwords
We mathematically explore a model for the shortness and security for passwords that are stored in hashed form. The model is implicitly in the NIST publication [8] and is based on c...
Eric R. Verheul