Results 11 - 20
of
26
JF-Cut: A Parallel Graph Cut Approach for Large-scale Data
"... Abstract—Graph Cut has proven to be an effective scheme to solve a wide variety of segmentation problems in graphics community. The main limitation of conventional graph-cut implementations is that they can hardly handle large-scale datasets because of high computational complexity. Even though ther ..."
Abstract
- Add to MetaCart
user interface for specifying interested regions in cases of occlusions when handling volumetric data or video sequences. Experiments on a variety of datasets, including images (up to 15K × 10K), videos (up to 2.5K × 1.5K × 50), and volumetric data, achieve high quality results and a maximum 164-fold
design (CAD)
"... Advanced process technologies call for a proactive consideration of process variations in design to ensure high parametric timing yield. Despite of its popular use in almost any high performance IC designs nowadays, however, buffer insertion has not gained enough attention in addressing this issue. ..."
Abstract
- Add to MetaCart
. In this paper, we propose a novel algorithm for buffer insertion to consider process variations. The major contribution of this work is two-fold: (1) an efficient technique to handle correlated process variations under nonlinear operations; (2) a provable transitive closure pruning rule that makes linear
© 2004 Kluwer Academic Publishers. Printed in the Netherlands. Gaussian mapping of chemical fragments in ligand binding sites
, 2003
"... We present a new approach to automatically define a quasi-optimal minimal set of pharmacophoric points mapping the interaction properties of a user-defined ligand binding site. The method is based on a fitting algorithm where a grid of sampled interaction energies of the target protein with small ch ..."
Abstract
- Add to MetaCart
for the ligand. An average 4–5-fold speed-up in docking times and a similar success rate is estimated with respect to the standard DOCK protocol.
A Customisable Multiprocessor for Application-Optimised Inductive Logic Programming
"... This paper describes a customisable processor designed to accelerate execution of inductive logic programming, targeting advanced field-programmable gate array (FPGA) technology. The instruction set and the microarchitecture of the processor are optimised for key operations in logic programming, suc ..."
Abstract
- Add to MetaCart
. We find that up to 32 processors can fit on an XC2V6000 FPGA. Using this device, the computational kernel of the machine learning system Progol, when applied to common bioinformatics data sets for learning to identify mutagenesis and protein folds, can yield speedups of up to 15 times over software
ARTICLE pubs.acs.org/JCTC Enhanced Lipid Diffusion and Mixing in Accelerated Molecular Dynamics
"... bS Supporting Information ABSTRACT: Accelerated molecular dynamics (aMD) is an enhanced sampling technique that expedites conformational space sampling by reducing the barriers separating various low-energy states of a system. Here, we present the first application of the aMD method on lipid membran ..."
Abstract
- Add to MetaCart
membranes. Altogether, ∼1.5 μs simulations were performed on three systems: a pure POPC bilayer, a pure DMPC bilayer, and a mixed POPC:DMPC bilayer. Overall, the aMD simulations are found to produce significant speedup in trans gauche isomerization and lipid lateral diffusion versus those in conventional MD
RGBA Packing for Fast Cone Beam Reconstruction on the GPU
"... This paper presents a fast cone beam reconstruction method accelerated on the graphics processing unit (GPU). We implement the Feldkamp, Davis, and Kress (FDK) algorithm on the OpenGL graphics pipeline, which allows us to exploit the full resources and capabilities available on the GPU. The proposed ..."
Abstract
- Add to MetaCart
.1 seconds to reconstruct a 5123-voxel volume from 360 5122-pixel projection images. This execution time is equivalent to a 15.6-fold speedup over a CPU implementation, showing 10% higher performance as compared with a previous OpenGL-based method that requires the single-slice rebinning of projections
Let A be a nite alphabet, jAj =: n, and suppose strings
"... Abstract. This paper analyzes the expected performance of a simplied version BM 0 of the Boyer{Moore string matching algorithm. A probabilistic automaton A is set up which models the expected behavior of BM 0 under the assumption that both text and pattern are generated by a source which emits indep ..."
Abstract
- Add to MetaCart
Abstract. This paper analyzes the expected performance of a simplied version BM 0 of the Boyer{Moore string matching algorithm. A probabilistic automaton A is set up which models the expected behavior of BM 0 under the assumption that both text and pattern are generated by a source which emits independent and uncorrelated symbols with an arbitrary distribution of probabilities. Formal developments lead then to the conclusion that A takes expected sublinear time in a variety of situations. The sublinear behavior can be quantitatively predicted by simple formulae involving the pattern length m and the alphabet's probabilistic properties. Finally, empirical evidence is provided which is in satisfactory accordance with the theory.
doi:10.1093/comjnl/bxp026 A Digest and Pattern Matching-Based Intrusion Detection Engine
, 2008
"... Intrusion detection/prevention systems (IDSs/IPSs) heavily rely on signature databases and pattern matching (PM) techniques to identify network attacks. The engines of such systems often employ traditional PM algorithms to search for telltale patterns in network flows. The observations that real-wor ..."
Abstract
- Add to MetaCart
Intrusion detection/prevention systems (IDSs/IPSs) heavily rely on signature databases and pattern matching (PM) techniques to identify network attacks. The engines of such systems often employ traditional PM algorithms to search for telltale patterns in network flows. The observations that real-world network traffic is largely legitimate and that telltales manifested by exploits rarely appear in network streams lead us to the proposal of Fingerprinter. This framework integrates fingerprinting and PM methods to rapidly distinguish well-behaved from malicious traffic. Fingerprinter produces concise digests or fingerprints for attack signatures during its programming phase. In its querying phase, the framework quickly identifies attack-free connections by transforming input traffic into its fingerprint space and matching its digest against those of attack signatures. If the legitimacy of a stream cannot be determined by fingerprints alone, our framework uses the Boyer–Moore algorithm to ascertain whether attack signatures appear in the stream. To reduce false matches, we resort to multiple fingerprinting techniques including Bloom–Filter and Rabin–Fingerprint. Experimentation with a prototype and a variety of traces has helped us establish that Fingerprinter significantly accelerates the attack detection process.
unknown title
"... Algebraic cryptanalysis of the round-reduced and side channel analysis of the full PRINTCipher-48 ..."
Abstract
- Add to MetaCart
Algebraic cryptanalysis of the round-reduced and side channel analysis of the full PRINTCipher-48
Recursive Blocked Algorithms for Solv-ing Triangular Systems-Part II: Two-Sided and Generalized Sylvester and Lyapunov Matrix Equations †
"... Akademisk avhandling som med tillstånd av rektorsämbetet vid Umeå universitet framläggs till offentlig granskning onsdagen den 17 december klockan 13.15 i sal MA121, MIT-huset, för avläggande av teknologie doktorsexamen. Print & Media, Umeå Universitet UMINF-03.17 Abstract This thesis deals wi ..."
Abstract
- Add to MetaCart
together with superscalar kernels produce new algorithms that give 10-fold speedups compared to existing routines in the SLICOT and LAPACK libraries. We show that our recursive algorithms also have a significant impact on the execution time of solving unreduced problems and when used in condition
Results 11 - 20
of
26