Sciweavers

248 search results - page 32 / 50
» Virtual Symmetry Reduction
Sort
View
INFOCOM
2010
IEEE
13 years 8 months ago
Distributed Caching Algorithms for Content Distribution Networks
—The delivery of video content is expected to gain huge momentum, fueled by the popularity of user-generated clips, growth of VoD libraries, and wide-spread deployment of IPTV se...
Sem C. Borst, Varun Gupta, Anwar Walid
MICRO
2006
IEEE
100views Hardware» more  MICRO 2006»
14 years 3 months ago
Serialization-Aware Mini-Graphs: Performance with Fewer Resources
Instruction aggregation—the grouping of multiple operations into a single processing unit—is a technique that has recently been used to amplify the bandwidth and capacity of c...
Anne Bracy, Amir Roth
POPL
2010
ACM
14 years 7 months ago
Pure Subtype Systems
This paper introduces a new approach to type theory called pure subtype systems. Pure subtype systems differ from traditional approaches to type theory (such as pure type systems)...
DeLesley S. Hutchins
ICCV
2007
IEEE
14 years 11 months ago
Discriminant Embedding for Local Image Descriptors
Invariant feature descriptors such as SIFT and GLOH have been demonstrated to be very robust for image matching and visual recognition. However, such descriptors are generally par...
Gang Hua, Matthew Brown, Simon A. J. Winder
FSE
2009
Springer
136views Cryptology» more  FSE 2009»
14 years 10 months ago
MAC Reforgeability
Message Authentication Codes (MACs) are core algorithms deployed in virtually every security protocol in common usage. In these protocols, the integrity and authenticity of messag...
John Black, Martin Cochran