• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 11 - 20 of 26
Next 10 →

JF-Cut: A Parallel Graph Cut Approach for Large-scale Data

by Yi Peng, Li Chen, Fang-xin Ou-yang, Wei Chen, Jun-hai Yong
"... Abstract—Graph Cut has proven to be an effective scheme to solve a wide variety of segmentation problems in graphics community. The main limitation of conventional graph-cut implementations is that they can hardly handle large-scale datasets because of high computational complexity. Even though ther ..."
Abstract - Add to MetaCart
user interface for specifying interested regions in cases of occlusions when handling volumetric data or video sequences. Experiments on a variety of datasets, including images (up to 15K × 10K), videos (up to 2.5K × 1.5K × 50), and volumetric data, achieve high quality results and a maximum 164-fold

design (CAD)

by Jinjun Xiong, Lei He
"... Advanced process technologies call for a proactive consideration of process variations in design to ensure high parametric timing yield. Despite of its popular use in almost any high performance IC designs nowadays, however, buffer insertion has not gained enough attention in addressing this issue. ..."
Abstract - Add to MetaCart
. In this paper, we propose a novel algorithm for buffer insertion to consider process variations. The major contribution of this work is two-fold: (1) an efficient technique to handle correlated process variations under nonlinear operations; (2) a provable transitive closure pruning rule that makes linear

© 2004 Kluwer Academic Publishers. Printed in the Netherlands. Gaussian mapping of chemical fragments in ligand binding sites

by Kun Wang, Marta Murcia, Pere Constans, Angel R. Ortiz , 2003
"... We present a new approach to automatically define a quasi-optimal minimal set of pharmacophoric points mapping the interaction properties of a user-defined ligand binding site. The method is based on a fitting algorithm where a grid of sampled interaction energies of the target protein with small ch ..."
Abstract - Add to MetaCart
for the ligand. An average 4–5-fold speed-up in docking times and a similar success rate is estimated with respect to the standard DOCK protocol.

A Customisable Multiprocessor for Application-Optimised Inductive Logic Programming

by Andreas Fidjel, Wayne Luk, Stephen Muggleton
"... This paper describes a customisable processor designed to accelerate execution of inductive logic programming, targeting advanced field-programmable gate array (FPGA) technology. The instruction set and the microarchitecture of the processor are optimised for key operations in logic programming, suc ..."
Abstract - Add to MetaCart
. We find that up to 32 processors can fit on an XC2V6000 FPGA. Using this device, the computational kernel of the machine learning system Progol, when applied to common bioinformatics data sets for learning to identify mutagenesis and protein folds, can yield speedups of up to 15 times over software

ARTICLE pubs.acs.org/JCTC Enhanced Lipid Diffusion and Mixing in Accelerated Molecular Dynamics

by Yi Wang, Phineus R. L. Markwick, Cesar Augusto, F. Oliveira, J. Andrew Mccammon
"... bS Supporting Information ABSTRACT: Accelerated molecular dynamics (aMD) is an enhanced sampling technique that expedites conformational space sampling by reducing the barriers separating various low-energy states of a system. Here, we present the first application of the aMD method on lipid membran ..."
Abstract - Add to MetaCart
membranes. Altogether, ∼1.5 μs simulations were performed on three systems: a pure POPC bilayer, a pure DMPC bilayer, and a mixed POPC:DMPC bilayer. Overall, the aMD simulations are found to produce significant speedup in trans gauche isomerization and lipid lateral diffusion versus those in conventional MD

RGBA Packing for Fast Cone Beam Reconstruction on the GPU

by Fumihiko Inoa, Seiji Yoshidaa, Kenichi Hagiharaa
"... This paper presents a fast cone beam reconstruction method accelerated on the graphics processing unit (GPU). We implement the Feldkamp, Davis, and Kress (FDK) algorithm on the OpenGL graphics pipeline, which allows us to exploit the full resources and capabilities available on the GPU. The proposed ..."
Abstract - Add to MetaCart
.1 seconds to reconstruct a 5123-voxel volume from 360 5122-pixel projection images. This execution time is equivalent to a 15.6-fold speedup over a CPU implementation, showing 10% higher performance as compared with a previous OpenGL-based method that requires the single-slice rebinning of projections

Let A be a nite alphabet, jAj =: n, and suppose strings

by R. Schaback
"... Abstract. This paper analyzes the expected performance of a simplied version BM 0 of the Boyer{Moore string matching algorithm. A probabilistic automaton A is set up which models the expected behavior of BM 0 under the assumption that both text and pattern are generated by a source which emits indep ..."
Abstract - Add to MetaCart
Abstract. This paper analyzes the expected performance of a simplied version BM 0 of the Boyer{Moore string matching algorithm. A probabilistic automaton A is set up which models the expected behavior of BM 0 under the assumption that both text and pattern are generated by a source which emits independent and uncorrelated symbols with an arbitrary distribution of probabilities. Formal developments lead then to the conclusion that A takes expected sublinear time in a variety of situations. The sublinear behavior can be quantitatively predicted by simple formulae involving the pattern length m and the alphabet's probabilistic properties. Finally, empirical evidence is provided which is in satisfactory accordance with the theory.

doi:10.1093/comjnl/bxp026 A Digest and Pattern Matching-Based Intrusion Detection Engine

by Zhongqiang Chen, Yuan Zhang, Zhongrong Chen, Alex Delis , 2008
"... Intrusion detection/prevention systems (IDSs/IPSs) heavily rely on signature databases and pattern matching (PM) techniques to identify network attacks. The engines of such systems often employ traditional PM algorithms to search for telltale patterns in network flows. The observations that real-wor ..."
Abstract - Add to MetaCart
Intrusion detection/prevention systems (IDSs/IPSs) heavily rely on signature databases and pattern matching (PM) techniques to identify network attacks. The engines of such systems often employ traditional PM algorithms to search for telltale patterns in network flows. The observations that real-world network traffic is largely legitimate and that telltales manifested by exploits rarely appear in network streams lead us to the proposal of Fingerprinter. This framework integrates fingerprinting and PM methods to rapidly distinguish well-behaved from malicious traffic. Fingerprinter produces concise digests or fingerprints for attack signatures during its programming phase. In its querying phase, the framework quickly identifies attack-free connections by transforming input traffic into its fingerprint space and matching its digest against those of attack signatures. If the legitimacy of a stream cannot be determined by fingerprints alone, our framework uses the Boyer–Moore algorithm to ascertain whether attack signatures appear in the stream. To reduce false matches, we resort to multiple fingerprinting techniques including Bloom–Filter and Rabin–Fingerprint. Experimentation with a prototype and a variety of traces has helped us establish that Fingerprinter significantly accelerates the attack detection process.

unknown title

by Stanislav Bulygin
"... Algebraic cryptanalysis of the round-reduced and side channel analysis of the full PRINTCipher-48 ..."
Abstract - Add to MetaCart
Algebraic cryptanalysis of the round-reduced and side channel analysis of the full PRINTCipher-48

Recursive Blocked Algorithms for Solv-ing Triangular Systems-Part II: Two-Sided and Generalized Sylvester and Lyapunov Matrix Equations †

by Isak Ii , Bo Jonsson , Kågström
"... Akademisk avhandling som med tillstånd av rektorsämbetet vid Umeå universitet framläggs till offentlig granskning onsdagen den 17 december klockan 13.15 i sal MA121, MIT-huset, för avläggande av teknologie doktorsexamen. Print & Media, Umeå Universitet UMINF-03.17 Abstract This thesis deals wi ..."
Abstract - Add to MetaCart
together with superscalar kernels produce new algorithms that give 10-fold speedups compared to existing routines in the SLICOT and LAPACK libraries. We show that our recursive algorithms also have a significant impact on the execution time of solving unreduced problems and when used in condition
Next 10 →
Results 11 - 20 of 26
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University