Sciweavers

154 search results - page 16 / 31
» The Software Performance of Authenticated-Encryption Modes
Sort
View
157
Voted
ISCAPDCS
2007
15 years 5 months ago
Architectural requirements of parallel computational biology applications with explicit instruction level parallelism
—The tremendous growth in the information culture, efficient digital searches are needed to extract and identify information from huge data. The notion that evolution in silicon ...
Naeem Zafar Azeemi
179
Voted
PLDI
2003
ACM
15 years 9 months ago
Compile-time dynamic voltage scaling settings: opportunities and limits
With power-related concerns becoming dominant aspects of hardware and software design, significant research effort has been devoted towards system power minimization. Among run-t...
Fen Xie, Margaret Martonosi, Sharad Malik
159
Voted
LISA
2008
15 years 6 months ago
Portable Desktop Applications Based on P2P Transportation and Virtualization
Play-on-demand is usually regarded as a feasible access mode for web content (including streaming video, web pages and so on), web services and some Software-As-A-Service (SaaS) a...
Youhui Zhang, Xiaoling Wang, Liang Hong
140
Voted
CHES
2007
Springer
327views Cryptology» more  CHES 2007»
15 years 10 months ago
On the Power of Bitslice Implementation on Intel Core2 Processor
Abstract. This paper discusses the state-of-the-art fast software implementation of block ciphers on Intel’s new microprocessor Core2, particularly concentrating on “bitslice i...
Mitsuru Matsui, Junko Nakajima
139
Voted
ICASSP
2009
IEEE
15 years 10 months ago
One-pass multi-layer rate-distortion optimization for quality scalable video coding
In this paper, a one-pass multi-layer rate-distortion optimization algorithm is proposed for quality scalable video coding. To improve the overall coding efficiency, the MB mode ...
Xiang Li, Peter Amon, Andreas Hutter, André...