Sciweavers

1147 search results - page 57 / 230
» Transformation of Access Rights
Sort
View
ASAP
2005
IEEE
151views Hardware» more  ASAP 2005»
14 years 2 months ago
Performance Comparison of SIMD Implementations of the Discrete Wavelet Transform
This paper focuses on SIMD implementations of the 2D discrete wavelet transform (DWT). The transforms considered are Daubechies’ real-to-real method of four coefficients (Daub-...
Asadollah Shahbahrami, Ben H. H. Juurlink, Stamati...
INTERACT
2003
13 years 10 months ago
User Interface Transformation Method for PC Remote Control with Small Mobile Devices
: One problem with controlling remote PCs via small mobile devices such as cellular phones is the difference between PC GUIs and mobile device UIs (screen sizes, input devices etc....
Hidehiko Okada, Toshiyuki Asahi
ICCAD
1997
IEEE
144views Hardware» more  ICCAD 1997»
14 years 28 days ago
Exploiting off-chip memory access modes in high-level synthesis
Memory-intensive behaviors often contain large arrays that are synthesized into off-chip memories. With the increasing gap between on-chip and off-chip memory access delays, it is...
Preeti Ranjan Panda, Nikil D. Dutt, Alexandru Nico...
ACSAC
2005
IEEE
14 years 2 months ago
Paranoid: A Global Secure File Access Control System
The Paranoid file system is an encrypted, secure, global file system with user managed access control. The system provides efficient peer-to-peer application transparent file ...
Fareed Zaffar, Gershon Kedem, Ashish Gehani
IPMI
2003
Springer
14 years 9 months ago
Fusion of Autoradiographies with an MR Volume Using 2-D and 3-D Linear Transformations
The recent development of 3-D medical imaging devices has given access to the 3-D imaging of in vivo tissues, from an anatomical (MR, CT) or even functional point of view (fMRI, PE...
Eric Bardinet, Grégoire Malandain