Sciweavers

3379 search results - page 393 / 676
» Powers of Two
Sort
View
ICMCS
2007
IEEE
117views Multimedia» more  ICMCS 2007»
15 years 10 months ago
Digital Media Indexing on the Cell Processor
We present a case study of developing a digital media indexing application, code-named MARVEL, on the STI Cell Broadband Engine (CBE) processor. There are two aspects of the targe...
Lurng-Kuo Liu, Qiang Liu, Apostol Natsev, Kenneth ...
ICRA
2007
IEEE
138views Robotics» more  ICRA 2007»
15 years 10 months ago
Adaptive Embedded Roadmaps For Sensor Networks
Abstract— In this paper, we propose a new approach to wireless sensor network assisted navigation while avoiding moving dangers. Our approach relies on an embedded roadmap in the...
Gazihan Alankus, Nuzhet Atay, Chenyang Lu, O. Bur&...
ESCIENCE
2006
IEEE
15 years 10 months ago
Grid Approach to Embarrassingly Parallel CPU-Intensive Bioinformatics Problems
Bioinformatics algorithms such as sequence alignment methods based on profile-HMM (Hidden Markov Model) are popular but CPU-intensive. If large amounts of data are processed, a s...
Heinz Stockinger, Marco Pagni, Lorenzo Cerutti, La...
CEC
2003
IEEE
15 years 9 months ago
An evolutionary approach for reducing the switching activity in address buses
In this paper we present two new approaches based on genetic algorithms (GA) to reduce power consumption by communication buses in an embedded system. The first approach makes it ...
Giuseppe Ascia, Vincenzo Catania, Maurizio Palesi,...
ASIACRYPT
2001
Springer
15 years 8 months ago
Threshold Cryptosystems Secure against Chosen-Ciphertext Attacks
Abstract. Semantic security against chosen-ciphertext attacks (INDCCA) is widely believed as the correct security level for public-key encryption scheme. On the other hand, it is o...
Pierre-Alain Fouque, David Pointcheval