Sciweavers

715 search results - page 80 / 143
» Second step algorithms in the Burrows-Wheeler compression al...
Sort
View
MICCAI
2002
Springer
14 years 8 months ago
Robust Registration of Multi-modal Images: Towards Real-Time Clinical Applications
Abstract. High performance computing has become a key step to introduce computer tools, like real-time registration, in the medical field. To achieve real-time processing, one usua...
Radu Stefanescu, Sébastien Ourselin, Xavier...
PAM
2007
Springer
14 years 1 months ago
A Measurement Study of Scheduler-Based Attacks in 3G Wireless Networks
Though high-speed (3G) wide-area wireless networks have been rapidly proliferating, little is known about the robustness and security properties of these networks. In this paper, w...
Soshant Bali, Sridhar Machiraju, Hui Zang, Victor ...
JCST
2007
97views more  JCST 2007»
13 years 7 months ago
Improved Collision Attack on Hash Function MD5
In this paper, we present a fast attack algorithm to find two-block collision of hash function MD5. The algorithm is based on the two-block collision differential path of MD5 that ...
Jie Liang, Xue-Jia Lai
ICIP
2003
IEEE
14 years 9 months ago
Robust line detection using a weighted MSE estimator
In this paper we introduce a novel line detection algorithm based on a weighted minimum mean square error (MSE) formulation. This algorithm has been developed to enable an autonom...
Guido M. Schuster, Aggelos K. Katsaggelos
ICCAD
2009
IEEE
179views Hardware» more  ICCAD 2009»
13 years 5 months ago
Automatic memory partitioning and scheduling for throughput and power optimization
Hardware acceleration is crucial in modern embedded system design to meet the explosive demands on performance and cost. Selected computation kernels for acceleration are usually ...
Jason Cong, Wei Jiang, Bin Liu, Yi Zou