Sciweavers

1147 search results - page 19 / 230
» Transformation of Access Rights
Sort
View
IEEEPACT
2009
IEEE
14 years 3 months ago
Data Layout Transformation for Enhancing Data Locality on NUCA Chip Multiprocessors
—With increasing numbers of cores, future CMPs (Chip Multi-Processors) are likely to have a tiled architecture with a portion of shared L2 cache on each tile and a bankinterleave...
Qingda Lu, Christophe Alias, Uday Bondhugula, Thom...
PET
2004
Springer
14 years 1 months ago
A Formal Privacy System and Its Application to Location Based Services
There are a variety of well-known models for access control developed for purposes like formally modeling the access rights on files, databases, and web resources. However, the ex...
Carl A. Gunter, Michael J. May, Stuart G. Stubbleb...
ICCD
2000
IEEE
87views Hardware» more  ICCD 2000»
14 years 5 months ago
A Register File with Transposed Access Mode
We introduce a new register file architecture that provides both row-wise and column-wise accesses, thus allowing partitioned instructions to be used in columnwise processing with...
Yoochang Jung, Stefan G. Berg, Donglok Kim, Yongmi...
IVC
2002
112views more  IVC 2002»
13 years 8 months ago
Using distance transforms to decompose 3D discrete objects
Object decomposition into simpler parts greatly diminishes the complexity of a recognition task. In this paper, we present a method to decompose a 3D discrete object into nearly c...
Stina Svensson, Gabriella Sanniti di Baja
PR
2000
166views more  PR 2000»
13 years 8 months ago
A window-based inverse Hough transform
In this paper a new Hough transform inversion technique is proposed. It is a window-based inverse Hough transform algorithm, which reconstructs the original image using only the d...
Anastasios L. Kesidis, Nikos Papamarkos