Sciweavers

909 search results - page 28 / 182
» The Economics of Large-Memory Computations
Sort
View
SIPS
2008
IEEE
14 years 4 months ago
Analysis of belief propagation for hardware realization
Belief propagation has become a popular technique for solving computer vision problems, such as stereo estimation and image denoising. However, it requires large memory and bandwi...
Chao-Chung Cheng, Chia-Kai Liang, Yen-Chieh Lai, H...
ICICS
2007
Springer
14 years 4 months ago
Extending FORK-256 Attack to the Full Hash Function
Abstract. In a paper published in FSE 2007, a way of obtaining nearcollisions and in theory also collisions for the FORK-256 hash function was presented [8]. The paper contained ex...
Scott Contini, Krystian Matusiewicz, Josef Pieprzy...
KDD
2000
ACM
110views Data Mining» more  KDD 2000»
14 years 1 months ago
An empirical analysis of techniques for constructing and searching k-dimensional trees
Affordable, fast computers with large memories have lessened the demand for program efficiency, but applications such as browsing and searching very large databases often have rat...
Douglas A. Talbert, Douglas H. Fisher
ICSC
1995
Springer
14 years 1 months ago
An Adaptive Supersampling Method
Original z-bu er method is a very ecient method for image generation. The limitation is that it introduces aliases into the output image. Although many di erent kinds of methods h...
Rynson W. H. Lau
POPL
2003
ACM
14 years 10 months ago
A type system for higher-order modules
We present a type theory for higher-order modules that accounts for many central issues in module system design, including translucency, applicativity, generativity, and modules a...
Derek Dreyer, Karl Crary, Robert Harper