Sciweavers

1147 search results - page 51 / 230
» Transformation of Access Rights
Sort
View
VLSID
2007
IEEE
130views VLSI» more  VLSID 2007»
14 years 9 months ago
Memory Architecture Exploration for Power-Efficient 2D-Discrete Wavelet Transform
The Discrete Wavelet Transform (DWT) forms the core of the JPEG2000 image compression algorithm. Since the JPEG2000 compression application is heavily data-intensive, the overall ...
Rahul Jain, Preeti Ranjan Panda
AGILEDC
2007
IEEE
14 years 3 months ago
Transforming a Six Month Release Cycle to Continuous Flow
This paper tells the story of how the team managed to speed up delivery whilst raising quality at the same time. conject used to release complete modules of their Internet platfor...
Matthias Marschall
IPPS
2006
IEEE
14 years 2 months ago
Coordinate transformation - a solution for the privacy problem of location based services?
Protecting location information of mobile users in Location Based Services (LBS) is a very important but quite difficult and still largely unsolved problem. Location information h...
Andreas Gutscher
PATMOS
2005
Springer
14 years 2 months ago
Improving the Memory Bandwidth Utilization Using Loop Transformations
Abstract. Embedded devices designed for various real-time multimedia and telecom applications, have a bottleneck in energy consumption and performance that becomes day by day more ...
Minas Dasygenis, Erik Brockmeyer, Francky Catthoor...
SC
1995
ACM
14 years 7 days ago
Index Array Flattening Through Program Transformation
This paper presents techniques for compiling loops with complex, indirect array accesses into loops whose array references have at most one level of indirection. The transformatio...
Raja Das, Paul Havlak, Joel H. Saltz, Ken Kennedy