4   Artículos

 
en línea
Ling Du, Zehong He, Yijing Wang, Xiaochao Wang and Anthony T. S. Ho    
Image hashing-based authentication methods have been widely studied with continuous advancements owing to the speed and memory efficiency. However, reference hash generation and threshold setting, which are used for similarity measures between original i... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Hikaru Takayashiki,Masayuki Sato,Kazuhiko Komatsu,Hiroaki Kobayashi     Pág. 86 - 101
As the number of cores and the memory bandwidth have increased in a balanced fashion, modern vector processors achieve high sustained performances, especially in memory-intensive applications in the fields of science and engineering. However, it is diffi... ver más
Revista: Supercomputing Frontiers and Innovations    Formato: Electrónico

« Anterior     Página: 1 de 1     Siguiente »