Sciweavers

221 search results - page 29 / 45
» The Effects of Multiple Algorithms in the Advanced Encryptio...
Sort
View
ICCV
2005
IEEE
14 years 10 months ago
Passive Photometric Stereo from Motion
We introduce an iterative algorithm for shape reconstruction from multiple images of a moving (Lambertian) object illuminated by distant (and possibly time varying) lighting. Star...
Jongwoo Lim, Jeffrey Ho, Ming-Hsuan Yang, David J....
ASAP
2003
IEEE
124views Hardware» more  ASAP 2003»
14 years 1 months ago
Arbitrary Bit Permutations in One or Two Cycles
Symmetric-key block ciphers encrypt data, providing data confidentiality over the public Internet. For inter-operability reasons, it is desirable to support a variety of symmetric...
Zhijie Shi, Xiao Yang, Ruby B. Lee
ARITH
2009
IEEE
14 years 3 months ago
A Dual-Purpose Real/Complex Logarithmic Number System ALU
—The real Logarithmic Number System (LNS) allows fast and inexpensive multiplication and division but more expensive addition and subtraction as precision increases. Recent advan...
Mark G. Arnold, Sylvain Collange
VISSYM
2007
13 years 11 months ago
Multi-Resolution Techniques for Visual Exploration of Large Time-Series Data
Time series are a data type of utmost importance in many domains such as business management and service monitoring. We address the problem of visualizing large time-related data ...
Ming C. Hao, Umeshwar Dayal, Daniel A. Keim, Tobia...
DAC
2003
ACM
14 years 9 months ago
Pushing ASIC performance in a power envelope
Power dissipation is becoming the most challenging design constraint in nanometer technologies. Among various design implementation schemes, standard cell ASICs offer the best pow...
Ruchir Puri, Leon Stok, John M. Cohn, David S. Kun...