Efficient Concurrent Processing of Separable 2-D Transforms in C++11 (English)
- New search for: Weiss, J.
- New search for: Weiss, J.
- New search for: Goto, T.
In:
Computer applications in industry and engineering; (CAINE-2014)
;
257-262
;
2014
-
ISBN:
- Conference paper / Print
-
Title:Efficient Concurrent Processing of Separable 2-D Transforms in C++11
-
Contributors:
-
Conference:International Conference; 27th, Computer applications in industry and engineering; (CAINE-2014) ; 2014 ; New Orleans, LA
-
Published in:
-
Publisher:
- New search for: International Society for Computers and Their Applications
-
Place of publication:Cary, NC
-
Publication date:2014-01-01
-
Size:6 pages
-
Remarks:Includes bibliographical references and index
-
ISBN:
-
Type of media:Conference paper
-
Type of material:Print
-
Language:English
-
Keywords:
-
Source:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Oodles of Moodles and More: Does the Flipped Classroom Format Really Improve Learning?Lee, G. et al. | 2014
- 3
-
Handling Abnormal Microarray ImagesHuang, C.-Y. et al. | 2014
- 9
-
Development of Health Diagnostics Based on Personalized Medical ModelsHudson, S. / Cohen, M. / Hudson, D. et al. | 2014
- 15
-
NeoCortical Builder: A Web Based Front End for NCSBerlinski, J. / Chavez, M. / Rowe, C. / Jordan, N. / Tanna, D. / Hoang, R. / Dascalu, S. / Harris, F.C. / Bray, L.C.J. et al. | 2014
- 21
-
Systematic Coronary Risk Evaluation through Artificial Neural Networks based SystemsRodrigues, B. / Gomes, S. / Vicente, H. / Abelha, A. / Novais, P. / Machado, J. / Neves, J. et al. | 2014
- 27
-
Applications of Machine Learning in Cyber SecurityFord, V. / Siraj, A. et al. | 2014
- 33
-
Perturbing Information Security Policy Statements using Deviational AnalysisSrivatanakul, T. et al. | 2014
- 39
-
Refinement of XACML Implementation on Role-Based Access ControlO brien, S. / Jin, Y. / Sorley, T. et al. | 2014
- 45
-
Simulation and Performance Analysis of Stadium Crowd EvacuationZarket, M. / Aldana, N. / Fox, C. / Diehl, E. / Dimitoglou, G. et al. | 2014
- 53
-
Towards Mechanistically Explanatory Biomimetic Analogs for Fracture HealingMarmor, M. / Bahney, C. / Hunt, C.A. et al. | 2014
- 59
-
Introducing Cloud Database Management in Undergraduate CurriculumJin, Y. / Li, J. et al. | 2014
- 65
-
Incorporating AI Topics in Game Programming CourseLiu, Z. et al. | 2014
- 71
-
Students Teaching Students: A Long-Term, Team Based ProjectJohnson, T. / Stringfellow, C. / Musarurwa, S. et al. | 2014
- 77
-
Advancing Wireless Sensor Networks Performance over Radio Trigger Wake-Up CapabilitiesAlmajadub, F. / Elleithy, K. / Shaer, A. et al. | 2014
- 85
-
A Dynamic Clustering Algorithm for Object Tracking and Localization in WSNMusafer, H. / Abdulhameed, R. / Abdelfattah, E. / Elleithy, K. et al. | 2014
- 93
-
Developing Network Security Protocol by using Key Pre-Distribution for Wireless Sensor NetworkEltaeib, T. / Hassan, A. / Elleithy, K. et al. | 2014
- 97
-
Cost Analysis of 5th Generation TechnologyElmannai, W. / Elleithy, K. et al. | 2014
- 105
-
Optimized Cooperative Localization Technique Based on Linear Intersection over Wireless Sensor NetworksAlabbas, A. / Elleithy, K. et al. | 2014
- 113
-
Subject-dependent and Subject-independent Emotional Classification of CMAC-based Features using EFuNNYaacob, H. / Abdul, W. / Kamaruddin, N. et al. | 2014
- 119
-
Multi-Feature Criteria for Qualifying Hand Motion as a GestureMurphy, L. / Cheok, K.C. et al. | 2014
- 125
-
Analysis of EEG Signals using Mathematical Morphology Decomposition and Kurtosis: Detection of EpileptiformsHamal, A.Q. / Abdul, W. / Kamaruddin, N. et al. | 2014
- 131
-
A Concept of the Editing for Spreadsheets Based on Octgrids and SQLAnzai, K. / Anada, K. / Miyadera, Y. / Yaku, T. / Yokota, K. et al. | 2014
- 135
-
Node-to-set Disjoint Paths Routing in a Torus-connected Cycles NetworkBossard, A. / Kaneko, K. et al. | 2014
- 141
-
A Fault-tolerant Routing Algorithm based on Safety Levels in a Pancake GraphKaneko, K. et al. | 2014
- 147
-
Design of Structured Peer-to-Peer Networks Using Linear Diophantine EquationGupta, B. / Rahimi, S. / Koneru, S. / Liu, Z. et al. | 2014
- 151
-
An Agent Based Modelling for Huge Synchronized Task ProcessingTakahashi, S. / Matsuo, T. et al. | 2014
- 157
-
Simulating Cost-Efficient Bridge Designs with West Point Bridge DesignerHuang, A. / Wong, P. et al. | 2014
- 163
-
A System of Systems Approach to the Design of a Landing Gear System: A Case StudyEtschmaier, M. / Lee, G. et al. | 2014
- 169
-
Neuro-Cognitive Correlation of Memory Effectiveness and Emotional ArousalAlarabi, K. / Abdul, W. / Kamaruddin, N. et al. | 2014
- 175
-
Analysis of Dyslexic Children Dynamic Emotion Trajectory during Executive Function TasksKamaruddin, N. / Karim, I.A. / Abdul, W. et al. | 2014
- 181
-
LSR-Based Static Core Selection in Shared Tree MulticastingGupta, B. / Koneru, S. / Rahimi, S. et al. | 2014
- 187
-
MODBUS Protocol Fuzzing for Cyber-security Evaluation of Industrial Control SystemsSabraoui, M. / Hieb, J. / Graham, J. et al. | 2014
- 193
-
Piggy, A Tool for Rapid Prototyping, Testing, Monitoring, Protecting, and Logging of Network ApplicationsMeehan, J. et al. | 2014
- 199
-
Adaptive Modulation and Coding for Efficient Wireless Channel Capacity UtilisationBobbie, P.O. / Awuku-Asabere, W. et al. | 2014
- 207
-
Adoption of Social Networking Systems in Higher Education: a Comparison of Theoritical ModelsThongmak, M. et al. | 2014
- 215
-
Asynchronous Update on Out-of-Core Column-Store Databases Utilizing the Timestamped Binary Association TableYu, F. / Luo, C. / Hou, W.-C. / Jones, E.S. et al. | 2014
- 221
-
Containment Join in the Presence of Nested Data NodesLuo, C. / Yu, F. / Hou, W.-C. / He, S. et al. | 2014
- 227
-
Hybrid CPU Scheduling Algorithm (HSA)Martin, I. et al. | 2014
- 233
-
LTV System Estimation Using TV CumulantsAl-Shoshan, A.I. et al. | 2014
- 239
-
Framework for Static Video Summarization using Accumulated MechanismMushtaq, M. / Siddiqua, A. et al. | 2014
- 245
-
Feature Analysis for Content-Based Trademark RetrievalAires, S. / Freitas, C. / Oliveira, L. et al. | 2014
- 251
-
Bilingual 2D Barcode Encoding with High CapacityKhorsheed, M.S. / Al-Omari, H. et al. | 2014
- 257
-
Efficient Concurrent Processing of Separable 2-D Transforms in C++11Weiss, J. et al. | 2014
- 263
-
Efficient Checkpoint Creation for MPI-based HPC Application ProgramsKongmunvattana, A. et al. | 2014
- 269
-
Automatic Speech Recognition for Dysphonic Patients by using Oriented Local FeaturesAli, Z. / Muhammad, G. / Alsulaiman, M. / Elamvazuthi, I. / Al-Mutib, K. et al. | 2014
- 275
-
Data Analysis in Subspace for Dynamic DataShi, Y. / Kim, S. et al. | 2014
- 281
-
Multi-Agent Architecture for Help Desk SupportKamel, A. et al. | 2014
- 287
-
PCA Based Mobile Robot Navigation and Mapping IntelligenceAlmutib, K. / Mattar, E. / Alsulaiman, M. / Hedjar, R. et al. | 2014
- 293
-
Practical Risk-Based Technique to Improve Reliability for Incremental Web Application DevelopmentJaffal, W. / Tian, J. et al. | 2014
- 299
-
Towards Bridging the Gap between CMMI and Agile Development MethodologiesGazzan, M. / Shaikh, A. et al. | 2014