Sciweavers

2703 search results - page 499 / 541
» Optimizing memory transactions
Sort
View
EGH
2011
Springer
14 years 2 months ago
Simpler and Faster HLBVH with Work Queues
A recently developed algorithm called Hierachical Linear Bounding Volume Hierarchies (HLBVH) has demonstrated the feasibility of reconstructing the spatial index needed for ray tr...
Kirill Garanzha, Jacopo Pantaleoni, David K. McAll...
134
Voted
IACR
2011
252views more  IACR 2011»
14 years 2 months ago
A Meet-in-the-Middle Attack on the Full KASUMI
KASUMI is a block cipher which consists eight Feistel rounds with a 128-bit key. The confidentiality and integrity of UMTS, GSM and GPRS mobile communications systems depend heavi...
Keting Jia, Hongbo Yu, Xiaoyun Wang
121
Voted
INFOCOM
2012
IEEE
13 years 5 months ago
FlowSifter: A counting automata approach to layer 7 field extraction for deep flow inspection
Abstract—In this paper, we introduce FlowSifter, a systematic framework for online application protocol field extraction. FlowSifter introduces a new grammar model Counting Regu...
Chad R. Meiners, Eric Norige, Alex X. Liu, Eric To...
VIS
2007
IEEE
125views Visualization» more  VIS 2007»
16 years 3 months ago
High-Quality Multimodal Volume Rendering for Preoperative Planning of Neurosurgical Interventions
Surgical approaches tailored to an individual patient's anatomy and pathology have become standard in neurosurgery. Precise preoperative planning of these procedures, however,...
Johanna Beyer, Markus Hadwiger, Stefan Wolfsberg...
139
Voted
DAC
2003
ACM
16 years 3 months ago
Using estimates from behavioral synthesis tools in compiler-directed design space exploration
This paper considers the role of performance and area estimates from behavioral synthesis in design space exploration. We have developed a compilation system that automatically ma...
Byoungro So, Pedro C. Diniz, Mary W. Hall