Sciweavers

2196 search results - page 198 / 440
» Practical Reasoning Using Values
Sort
View
SC
2009
ACM
14 years 4 months ago
Evaluating the impact of inaccurate information in utility-based scheduling
Proponents of utility-based scheduling policies have shown the potential for a 100–1400% increase in value-delivered to users when used in lieu of traditional approaches such as...
Alvin AuYoung, Amin Vahdat, Alex C. Snoeren
MYCRYPT
2005
Springer
248views Cryptology» more  MYCRYPT 2005»
14 years 3 months ago
A Family of Fast Syndrome Based Cryptographic Hash Functions
Recently, some collisions have been exposed for a variety of cryptographic hash functions [20,21] including some of the most widely used today. Many other hash functions using simi...
Daniel Augot, Matthieu Finiasz, Nicolas Sendrier
MSWIM
2003
ACM
14 years 2 months ago
Randomized location service in mobile ad hoc networks
Mobile Ad-Hoc Networks (MANETS) are networks of mobile nodes that do not have a fixed infrastructure. Recent research in this field addresses ways of solving existing problems i...
Sangeeta Bhattacharya
ISCA
2000
IEEE
78views Hardware» more  ISCA 2000»
14 years 1 months ago
Vector instruction set support for conditional operations
Vector instruction sets are receiving renewed interest because of their applicability to multimedia. Current multimedia instruction sets use short vectors with SIMD implementation...
James E. Smith, Greg Faanes, Rabin A. Sugumar
IPAS
2007
14 years 3 days ago
Prediction of signs of DCT coefficients in block-based lossy image compression
A practical impossibility of prediction of signs of DCT coefficients is generally accepted. Therefore each coded sign of DCT coefficients occupies usually 1 bit of memory in compr...
Nikolay N. Ponomarenko, Andriy V. Bazhyna, Karen O...