Sciweavers

1368 search results - page 73 / 274
» The Implicit Pipeline Method
Sort
View
NA
2010
124views more  NA 2010»
13 years 4 months ago
An efficient unified approach for the numerical solution of delay differential equations
In this paper we propose a new framework for designing a delay differential equation (DDE) solver which works with any supplied initial value problem (IVP) solver that is based on...
Hossein ZivariPiran, Wayne H. Enright
SC
1991
ACM
14 years 1 months ago
A method of vector processing for shared symbolic data
Kanada, Y., A method of vector processing for shared symbolic data, Parallel Computing, X (1993) XXX-XXX. Conventional processing techniques for pipelined vector processors such a...
Yasusi Kanada
CHES
2007
Springer
136views Cryptology» more  CHES 2007»
14 years 4 months ago
CAIRN 2: An FPGA Implementation of the Sieving Step in the Number Field Sieve Method
The hardness of the integer factorization problem assures the security of some public-key cryptosystems including RSA, and the number field sieve method (NFS), the most efficient ...
Tetsuya Izu, Jun Kogure, Takeshi Shimoyama
CGF
2010
148views more  CGF 2010»
13 years 10 months ago
Two Methods for Fast Ray-Cast Ambient Occlusion
Ambient occlusion has proven to be a useful tool for producing realistic images, both in offline rendering and interactive applications. In production rendering, ambient occlusion...
Samuli Laine, Tero Karras
ICSE
2008
IEEE-ACM
14 years 10 months ago
An ontology-driven software architecture evaluation method
Software architecture evaluation has a crucial role in the life cycle of software intensive systems. In this paper we propose an approach to empower a software architecture evalua...
Aida Erfanian, Fereidoun Shams Aliee