Primitives

Results: 220



#Item
131Profilers / VTune / Intel C++ Compiler / Intel Parallel Studio / Microsoft Visual Studio / X86-64 / Intel / Integrated Performance Primitives / Compiler / Computing / Software / Computer programming

INTEL® PARALLEL STUDIO XE EVALUATION GUIDE INTEL® PARALLEL STUDIO XE EVALUATION GUIDE Get an Easy Performance Boost Even with Unthreaded Apps Introduction

Add to Reading List

Source URL: www.greymatter.com

Language: English - Date: 2014-09-11 10:25:59
132Internet protocols / Internet standards / Routing protocols / Computer networking / Border Gateway Protocol / Topology / Routing / Hop / Internet / Network architecture / Computing

Primitives for Active Internet Topology Mapping: Toward High-Frequency Characterization Robert Beverly, Arthur Berger∗ , Geoffrey Xie Naval Postgraduate School ∗

Add to Reading List

Source URL: www.caida.org

Language: English - Date: 2015-02-02 18:45:37
133Primitive data type / Computing / Computer programming / Software engineering / Data types / Computer arithmetic / Q

Mango Data Primitives  Jennifer Chang | Last Update: 26 February 2015    1. There are ​ 4 data primitives​

Add to Reading List

Source URL: www.complex.iastate.edu

Language: English - Date: 2015-03-02 20:43:21
134Imaging / Optics / Photogrammetry / Geometric primitive / Remote sensing / Object recognition / Texture mapping / 3D modeling / Topography / Cartography / Computer vision / Vision

© Crown copyrightReproduced by permission of Ordnance Survey. IMAGE PRIMITIVES: AUTOMATING IMAGE INTERPRETATION PROCEDURES IN TOPOGRAPHIC MAP PRODUCTION W. Tompkinson*

Add to Reading List

Source URL: www.ordnancesurvey.co.uk

Language: English - Date: 2014-05-14 06:54:03
135Group theory / Finite fields / Computational hardness assumptions / Logarithms / Discrete logarithm / Diffie–Hellman problem / Baby-step giant-step / Elliptic curve / Diffie–Hellman key exchange / Abstract algebra / Cryptography / Mathematics

Chapter 10 Number-Theoretic Primitives Number theory is a source of several computational problems that serve as primitives in the design of cryptographic schemes. Asymmetric cryptography in particular relies on these pr

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2009-09-20 23:35:30
136Triangle / Cul-de-sac / Geometry / Triangulation / Delaunay triangulation

Using a Triangulation Skeleton to Identify Road Primitives and Organise Conflict Resolution in Road Networks

Add to Reading List

Source URL: www.ordnancesurvey.co.uk

Language: English - Date: 2014-05-14 06:52:42
137Internet Relay Chat / Online chat / Email / Spamming / Spam filtering / Anti-spam techniques / Computing / Internet / Computer-mediated communication

5.Language Definition This chapter presents a complete description of the present state of the Joule language design. First, the computational primitives are described, along with typical techniques for their use. This

Add to Reading List

Source URL: erights.org

Language: English - Date: 2004-12-04 19:43:57
138Graphics hardware / Computer architecture / Nvidia / Video cards / Kernel / Thread / Parallel Thread Execution / CUDA / OpenCL / Computing / GPGPU / Computer hardware

The 45th Annual IEEE/ACM International Symposium on Microarchitecture, 2012 Kernel Weaver: Automatically Fusing Database Primitives for Efficient GPU Computation Haicheng Wu Gregory Diamos

Add to Reading List

Source URL: www.gdiamos.net

Language: English - Date: 2012-11-05 15:15:42
139Measurement / Homomorphic encryption / Smart meter / Public-key cryptography / Ciphertext / Cipher / Smart grid / Smart card / Cryptography / Energy / Technology

HOMOMORPHIC PRIMITIVES FOR A PRIVACY-FRIENDLY SMART METERING ARCHITECTURE Benjamin Vetter1 , Osman Ugus1 , Dirk Westhoff1 and Christoph Sorge2 1 Department of Computer Science, HAW Hamburg, Germany

Add to Reading List

Source URL: www.cs.uni-paderborn.de

Language: English - Date: 2012-08-30 05:14:49
140Virtual memory / Central processing unit / Cache / C dynamic memory allocation / Slab allocation / CPU cache / Page / Memory leak / Memory pool / Computing / Computer memory / Memory management

CHAPTER SEVEN GETTING HOLD OF MEMORY Thus far, we have used kmalloc and kfr ee for the allocation and freeing of memory. The Linux kernel offers a richer set of memory allocation primitives, however.

Add to Reading List

Source URL: www.xml.com

Language: English - Date: 2001-07-12 23:10:12
UPDATE