Sciweavers

4624 search results - page 154 / 925
» Performance Evaluation of HPCN Applications
Sort
View
CHES
2009
Springer
150views Cryptology» more  CHES 2009»
14 years 5 months ago
A Design Flow and Evaluation Framework for DPA-Resistant Instruction Set Extensions
Power-based side channel attacks are a significant security risk, especially for embedded applications. To improve the security of such devices, protected logic styles have been p...
Francesco Regazzoni, Alessandro Cevrero, Fran&cced...
INFOCOM
2009
IEEE
14 years 5 months ago
Synchronized CSMA Contention: Model, Implementation and Evaluation
— A class of CSMA protocols used in a broad range of wireless applications uses synchronized contention where nodes periodically contend at intervals of fixed duration. While se...
Jing Shi, Ehsan Aryafar, Theodoros Salonidis, Edwa...
SSDBM
2008
IEEE
177views Database» more  SSDBM 2008»
14 years 4 months ago
Prioritized Evaluation of Continuous Moving Queries over Streaming Locations
Abstract. Existing approaches to the management of streaming positional updates generally assume that all active user requests have equal importance, ignoring the possibility of an...
Kostas Patroumpas, Timos K. Sellis
APGV
2006
ACM
107views Visualization» more  APGV 2006»
14 years 4 months ago
Evaluation of supra-threshold perceptual metrics for 3D models
Measures of dissimilarity of 3D models are necessary in a wide range of applications such as geometry compression, simplification, and 3D model retrieval. In many cases a metric ...
Ioan Cleju, Dietmar Saupe
HIPEAC
2005
Springer
14 years 3 months ago
A Practical Method for Quickly Evaluating Program Optimizations
This article aims at making iterative optimization practical and usable by speeding up the evaluation of a large range of optimizations. Instead of using a full run to evaluate a s...
Grigori Fursin, Albert Cohen, Michael F. P. O'Boyl...