Sciweavers

232 search results - page 29 / 47
» A Systematic Incrementalization Technique and Its Applicatio...
Sort
View
VALUETOOLS
2006
ACM
236views Hardware» more  VALUETOOLS 2006»
14 years 1 months ago
The DISCO network calculator: a toolbox for worst case analysis
In this paper we describe the design, implementation, and analytical background of the DISCO Network Calculator. The DISCO Network Calculator is an open-source toolbox written in ...
Jens B. Schmitt, Frank A. Zdarsky
VISUALIZATION
2005
IEEE
14 years 29 days ago
Visual Analysis and Exploration of Fluid Flow in a Cooling Jacket
We present a visual analysis and exploration of fluid flow through a cooling jacket. Engineers invest a large amount of time and serious effort to optimize the flow through thi...
Robert S. Laramee, Christoph Garth, Helmut Doleisc...
DSN
2005
IEEE
14 years 1 months ago
Detecting Stealth Software with Strider GhostBuster
Stealth malware programs that silently infect enterprise and consumer machines are becoming a major threat to the future of the Internet [XZ04]. Resource hiding is a powerful stea...
Yi-Min Wang, Doug Beck, Binh Vo, Roussi Roussev, C...
ISLPED
2003
ACM
122views Hardware» more  ISLPED 2003»
14 years 20 days ago
A mixed-clock issue queue design for globally asynchronous, locally synchronous processor cores
Ever shrinking device sizes and innovative micro-architectural and circuit design techniques have made it possible to have multi-million transistor systems running at multi-gigahe...
Venkata Syam P. Rapaka, Diana Marculescu
FPGA
2009
ACM
343views FPGA» more  FPGA 2009»
14 years 2 months ago
Fpga-based face detection system using Haar classifiers
This paper presents a hardware architecture for face detection based system on AdaBoost algorithm using Haar features. We describe the hardware design techniques including image s...
Junguk Cho, Shahnam Mirzaei, Jason Oberg, Ryan Kas...