Sciweavers

399 search results - page 44 / 80
» aim 2000
Sort
View
BTW
2007
Springer
105views Database» more  BTW 2007»
14 years 1 months ago
When the Internet Hits the Road
: The Internet has recovered from the dot-com crash of the early 2000’s and now features an abundance of new, innovative technologies and services. We are also witnessing the eme...
Christian S. Jensen
MICRO
2006
IEEE
114views Hardware» more  MICRO 2006»
14 years 1 months ago
Authentication Control Point and Its Implications For Secure Processor Design
Secure processor architecture enables tamper-proof protection on software that addresses many difficult security problems such as reverse-engineering prevention, trusted computing...
Weidong Shi, Hsien-Hsin S. Lee
MMM
2005
Springer
152views Multimedia» more  MMM 2005»
14 years 1 months ago
Learning No-Reference Quality Metric by Examples
In this paper, a novel learning based method is proposed for No-Reference image quality assessment. Instead of examining the exact prior knowledge for the given type of distortion...
Hanghang Tong, Mingjing Li, HongJiang Zhang, Chang...
HIPEAC
2005
Springer
14 years 1 months ago
A Practical Method for Quickly Evaluating Program Optimizations
This article aims at making iterative optimization practical and usable by speeding up the evaluation of a large range of optimizations. Instead of using a full run to evaluate a s...
Grigori Fursin, Albert Cohen, Michael F. P. O'Boyl...
ICCS
2004
Springer
14 years 1 months ago
Platform-Independent Cache Optimization by Pinpointing Low-Locality Reuse
Abstract. For many applications, cache misses are the primary performance bottleneck. Even though much research has been performed on automatically optimizing cache behavior at the...
Kristof Beyls, Erik H. D'Hollander