Sciweavers

9520 search results - page 1799 / 1904
» is 2011
Sort
View
FPGA
2011
ACM
393views FPGA» more  FPGA 2011»
14 years 8 months ago
Comparing FPGA vs. custom cmos and the impact on processor microarchitecture
As soft processors are increasingly used in diverse applications, there is a need to evolve their microarchitectures in a way that suits the FPGA implementation substrate. This pa...
Henry Wong, Vaughn Betz, Jonathan Rose
FSE
2011
Springer
289views Cryptology» more  FSE 2011»
14 years 8 months ago
On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model
Abstract. Bellare and Kohno introduced a formal framework for the study of related-key attacks against blockciphers. They established sufficient conditions (output-unpredictabilit...
Martin R. Albrecht, Pooya Farshim, Kenny G. Paters...
FUIN
2011
358views Cryptology» more  FUIN 2011»
14 years 8 months ago
Unsupervised and Supervised Learning Approaches Together for Microarray Analysis
In this article, a novel concept is introduced by using both unsupervised and supervised learning. For unsupervised learning, the problem of fuzzy clustering in microarray data as ...
Indrajit Saha, Ujjwal Maulik, Sanghamitra Bandyopa...
GRAPHICSINTERFACE
2011
14 years 8 months ago
Ubiquitous cursor: a comparison of direct and indirect pointing feedback in multi-display environments
Multi-display environments (MDEs) connect several displays into a single digital workspace. One of the main problems to be solved in an MDE’s design is how to enable movement of...
Robert Xiao, Miguel A. Nacenta, Regan L. Mandryk, ...
GRAPHICSINTERFACE
2011
14 years 8 months ago
Pop-up depth views for improving 3D target acquisition
We present the design and experimental evaluation of pop-up depth views, a novel interaction technique for aiding in the placement or positioning of a 3D cursor or object. Previou...
Guangyu Wang, Michael J. McGuffin, François...
« Prev « First page 1799 / 1904 Last » Next »