|
|
|
Ling Du, Zehong He, Yijing Wang, Xiaochao Wang and Anthony T. S. Ho
Image hashing-based authentication methods have been widely studied with continuous advancements owing to the speed and memory efficiency. However, reference hash generation and threshold setting, which are used for similarity measures between original i...
ver más
|
|
|
|
|
|
|
Hikaru Takayashiki,Masayuki Sato,Kazuhiko Komatsu,Hiroaki Kobayashi
Pág. 86 - 101
As the number of cores and the memory bandwidth have increased in a balanced fashion, modern vector processors achieve high sustained performances, especially in memory-intensive applications in the fields of science and engineering. However, it is diffi...
ver más
|
|
|
|