Sciweavers

1821 search results - page 328 / 365
» Security-Aware Program Transformations
Sort
View
EUROPAR
2001
Springer
14 years 1 months ago
Performance of High-Accuracy PDE Solvers on a Self-Optimizing NUMA Architecture
High-accuracy PDE solvers use multi-dimensional fast Fourier transforms. The FFTs exhibits a static and structured memory access pattern which results in a large amount of communic...
Sverker Holmgren, Dan Wallin
MIS
2001
Springer
151views Multimedia» more  MIS 2001»
14 years 1 months ago
A Data Model for Querying Wavelet Features in Image Databases
Multimedia databases deal with storage and retrieval of complex descriptors of image contents, called features. Traditional techniques consider features as “black boxes,” ofte...
Simone Santini, Amarnath Gupta
CSFW
1999
IEEE
14 years 1 months ago
A Meta-Notation for Protocol Analysis
Most formal approaches to security protocol analysis are based on a set of assumptions commonly referred to as the "Dolev-Yao model." In this paper, we use a multiset re...
Iliano Cervesato, Nancy A. Durgin, Patrick Lincoln...
SIGMOD
1999
ACM
143views Database» more  SIGMOD 1999»
14 years 1 months ago
WALRUS: A Similarity Retrieval Algorithm for Image Databases
Traditional approaches for content-based image querying typically compute a single signature for each image based on color histograms, texture, wavelet transforms etc., and return...
Apostol Natsev, Rajeev Rastogi, Kyuseok Shim
CC
1999
Springer
320views System Software» more  CC 1999»
14 years 1 months ago
Floating Point to Fixed Point Conversion of C Code
In processors that do not support floating-point instructions, using fixed-point arithmetic instead of floating-point emulation trades off computation accuracy for execution spe...
Andrea G. M. Cilio, Henk Corporaal