We use cookies to improve your experience with our site.

A General Low-Cost Indirect Branch Prediction Using Target Address Pointers
Zi-Chao Xie, Dong Tong, Ming-Kai Huang
2014, 29(6): 929-946. doi: 10.1007/s11390-014-1480-3
Retention Benefit Based Intelligent Cache Replacement
Ling-Da Li, Jun-Lin Lu, Xu Cheng
2014, 29(6): 947-961. doi: 10.1007/s11390-014-1481-2
A Static Greedy and Dynamic Adaptive Thread Spawning Approach for Loop-Level Parallelism
Mei-Rong Li, Yin-Liang Zhao, You Tao, Qi-Ming Wang
2014, 29(6): 962-975. doi: 10.1007/s11390-014-1482-1
An Intra-Server Interconnect Fabric for Heterogeneous Computing
Zheng Cao, Xiao-Li Liu, Qiang Li, Xiao-Bing Liu, Zhan Wang, Xue-Jun An
2014, 29(6): 976-988. doi: 10.1007/s11390-014-1483-0
Memory Efficient Two-Pass 3D FFT Algorithm for Intel® Xeon PhiTM Coprocessor
Yi-Qun Liu, Yan Li, Yun-Quan Zhang, Xian-Yi Zhang
2014, 29(6): 989-1002. doi: 10.1007/s11390-014-1484-z
Improved Blocking Time Analysis and Evaluation for the Multiprocessor Priority Ceiling Protocol
Mao-Lin Yang, Hang Lei, Yong Liao, Furkan Rabee
2014, 29(6): 1003-1013. doi: 10.1007/s11390-014-1485-y
Feature-Adaptive Rendering of Loop Subdivision Surfaces on Modern GPUs
Yun-Cen Huang, Jie-Qing Feng, Matthias NieBner, Yuan-Min Cui, Baoguang Yang
2014, 29(6): 1014-1025. doi: 10.1007/s11390-014-1486-x
A Two-Step Regularization Framework for Non-Local Means
Zhong-Gui Sun, Song-Can Chen, Li-Shan Qiao
2014, 29(6): 1026-1037. doi: 10.1007/s11390-014-1487-9
A Holistic Approach for Efficient Contour Detection
Hong Cheng, Lin Chen
2014, 29(6): 1038-1047. doi: 10.1007/s11390-014-1488-8
Mammogram Enhancement Using Lifting Dyadic Wavelet Transform and Normalized Tsallis Entropy
Muhammad Hussain
2014, 29(6): 1048-1057. doi: 10.1007/s11390-014-1489-7
Semisupervised Sparse Multilinear Discriminant Analysis
Kai Huang, Li-Qing Zhang
2014, 29(6): 1058-1071. doi: 10.1007/s11390-014-1490-1
Merge-Weighted Dynamic Time Warping for Speech Recognition
Xiang-Lilan Zhang, Zhi-Gang Luo, Ming Li
2014, 29(6): 1072-1082. doi: 10.1007/s11390-014-1491-0
CPL: Detecting Protein Complexes by Propagating Labels on Protein-Protein Interaction Network
Qi-Guo Dai, Mao-Zu Guo, Xiao-Yan Liu, Zhi-Xia Teng, Chun-Yu Wang
2014, 29(6): 1083-1093. doi: 10.1007/s11390-014-1492-z
Complete Bipartite Anonymity for Location Privacy
Kai Dong, Tao Gu, ACMXian-Ping Tao, Jian Lv
2014, 29(6): 1094-1110. doi: 10.1007/s11390-014-1493-y
Automated Power Control for Virtualized Infrastructures
Yu Wen, Wei-Ping Wang, Li Guo, Dan Meng
2014, 29(6): 1111-1122. doi: 10.1007/s11390-014-1494-x
Improved Linear Attacks on the Chinese Block Cipher Standard
Ming-Jie Liu, Jia-Zhe Chen
2014, 29(6): 1123-1133. doi: 10.1007/s11390-014-1495-9
Improved Linear Cryptanalysis of CAST-256
Jing-Yuan Zhao, Mei-Qin Wang, Long Wen
2014, 29(6): 1134-1139. doi: 10.1007/s11390-014-1496-8
Current Issue Cover