نتایج جستجو برای: sse differential

تعداد نتایج: 286400  

2018
James J. Dowling

The performance enhancement of stretch shortening cycle (SSe) contractions has been well documented in the literature. However, the majority of these studies have been performed either on gross human systems for multijointed movements, or in isolated animal muscle studies using in-vitro preparations. This study was designed to apply the principles used for these invitro animal studies to the hu...

2015
Xingliang Yuan Helei Cui Xinyu Wang Cong Wang

Searchable symmetric encryption (SSE) has been studied extensively for its full potential in enabling exact-match queries on encrypted records. Yet, situations for similarity queries remain to be fully explored. In this paper, we design privacy-assured similarity search schemes over millions of encrypted high-dimensional records. Our design employs locality-sensitive hashing (LSH) and SSE, wher...

1999
Jagannath Keshava

This paper discusses the implementation tradeoffs of the Pentium III processor. The Pentium III processor implements a new extension of the IA-32 instruction set called the Internet Streaming Single-Instruction, MultipleData (SIMD) Extensions (Internet SSE). The processor is based on the Pentium Pro processor microarchitecture. The initial development goals for the Pentium III processor were ...

2000
Srinivas K. Raman Vladimir Pentkovski Jagannath Keshava

0272-1732/00/$10.00  2000 IEEE In the volume PC market, the demand is growing for general-purpose processors that facilitate visual and graphical computing on the Internet. Responding to this need, Intel developed the streaming SIMD extensions (SSE), a set of processor instructions designed to boost performance of multimedia and Internet applications, and implemented them on its Pentium III pr...

Journal: :CoRR 2017
Huige Li Fangguo Zhang Jiejie He Haibo Tian

At present, the cloud storage used in searchable symmetric encryption schemes (SSE) is provided in a private way, which cannot be seen as a true cloud. Moreover, the cloud server is thought to be credible, because it always returns the search result to the user, even they are not correct. In order to really resist this malicious adversary and accelerate the usage of the data, it is necessary to...

2012
R. Behera B. B. Pati B. P. Panigrahi S. Misra

This work incorporates the identification of model in functional form using curve fitting and genetic programming technique which can forecast present and future load requirement. Approximating an unknown function with sample data is an important practical problem. In order to forecast an unknown function using a finite set of sample data, a function is constructed to fit sample data points. Th...

2010
J. T. Schneider M. Haas W. Ruhm J. Hennig

Introduction: During the last years, Spatially Selective Excitation (SSE) has become practicable in combination with parallel RF transmission. SSE applications like inner-volume imaging (IVI) [1] or targeted spectroscopy [2] utilize the possibility to restrict the generation of transverse magnetization MT to specified target volumes by spatial amplitude modulation according to a given target pa...

2017
Jose Antonio Urigüen Begoña García-Zapirain Julio Artieda Jorge Iriarte Miguel Valencia

Idiopathic epilepsy is characterized by generalized seizures with no apparent cause. One of its main problems is the lack of biomarkers to monitor the evolution of patients. The only tools they can use are limited to inspecting the amount of seizures during previous periods of time and assessing the existence of interictal discharges. As a result, there is a need for improving the tools to assi...

2015
Paul W. Stackhouse David Westberg James M. Hoell William S. Chandler Taiping Zhang

2004
A. Wäänänen Niels Bohr

In common Grid installations, the services responsible for storing big data chunks, replication of those data and indexing their availability are usually completely decoupled. And the task of synchronizing data is passed to either userlevel tools or separate services (like spiders) which are subject to failure and usually cannot perform properly if one of the underlying services fails too. The ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید