..............page:929-946
Retention Benefit Based Intelligent Cache Replacement
Ling-Da Li;Jun-Lin Lu;Xu Cheng;CCF;ACM;Microprocessor Research and Development Center;Peking University;Engineering Research Center of Microprocessor and System;Ministry of Education;School of Electronics Engineering and Computer Science;Peking University;
..............page:947-961
..............page:962-975
..............page:976-988
Memory Efficient Two-Pass 3D FFT Algorithm for Intel Xeon PhiTM Coprocessor
Yi-Qun Liu;Yan Li;Yun-Quan Zhang;Xian-Yi Zhang;Institute of Software;Chinese Academy of Sciences;University of Chinese Academy of Sciences;Department of Computer Science and Technology;Tsinghua University;CCF;ACM;IEEE;State Key Laboratory of Computer Architecture;Institute of Computing Technology;Chinese Academy of Sciences;
..............page:989-1002
..............page:1003-1013
..............page:1014-1025
..............page:1026-1037
A Holistic Approach for Efficient Contour Detection
Hong Cheng;Lin Chen;Department of Mathematics;Shanghai Jiao Tong University;Ministry of Education Key Lab of Scientific and Engineering Computing;Shanghai Jiao Tong University;Institute of Natural Sciences;Shanghai Jiao Tong University;School of Electronic;Information and Electrical Engineering;Shanghai Jiao Tong University;
..............page:1038-1047
..............page:1048-1057
..............page:1058-1071
Merge-Weighted Dynamic Time Warping for Speech Recognition
Xiang-Lilan Zhang;Zhi-Gang Luo;Ming Li;State Key Laboratory of Pathogen and Biosecurity;Beijing Institute of Microbiology and Epidemiology;Science and Technology on Parallel and Distributed Processing Laboratory;School of Computer Science National University of Defense Technology;David R.Cheriton School of Computer Science;University of Waterloo;Waterloo;Ontario N2L 3G1;Canada;ACM;IEEE;
..............page:1072-1082
..............page:1083-1093
Complete Bipartite Anonymity for Location Privacy
Kai Dong;Tao Gu;Xian-Ping Tao;Jian Lv;State Key Laboratory for Novel Software Technology;Nanjing University;Institute of Computer Software;Nanjing University;IEEE;ACM;School of Computer Science and Information Technology;RMIT University;Melbourne;Victoria 3001;Australia;CCF;
..............page:1094-1110
..............page:1111-1122
..............page:1123-1133
Improved Linear Cryptanalysis of CAST-256
Jing-Yuan Zhao;Mei-Qin Wang;Long Wen;Key Laboratory of Cryptologic Technology and Information Security;Ministry of Education;Shandong University;School of Mathematics;Shandong University;
..............page:1134-1139
..............page:1144-1147