183
click to vote
VLSID
16 years 5 months ago
2004 IEEE
demanding algorithm of a video encoder. It is known that about 60% ~ 80% of the total computation time is consumed for motion estimation [1]. The second is its high impact on the v...
181
click to vote
FCCM
15 years 8 months ago
2004 IEEE
Dynamically reconfigurable architectures or systems are able to reconfigure their function and/or structure to suit changing needs of a computation during run time. The increasing...
181
Voted
FCCM
15 years 8 months ago
2004 IEEE
It is valuable to identify and catalog design patterns for reconfigurable computing. These design patterns are canonical solutions to common and recurring design challenges which ...
176
click to vote
VLSID
16 years 5 months ago
2004 IEEE
This paper presents a novel technique for abstracting designs in order to increase the efficiency of formal property checking. Bounded Model Checking (BMC), using Satisfiability (...
170
click to vote
FCCM
15 years 8 months ago
2004 IEEE
Network Intrusion Detection and Prevention Systems (IDPS) use string matching to scan Internet packets for malicious content. Bloom filters offer a mechanism to search for a large...
|