Sciweavers

957 search results - page 74 / 192
» Addition Chain Heuristics
Sort
View
FAST
2009
13 years 8 months ago
Provenance as Data Mining: Combining File System Metadata with Content Analysis
Provenance describes how an object came to be in its present state. Thus, it describes the evolution of the object over time. Prior work on provenance has focussed on databases an...
Vinay Deolalikar, Hernan Laffitte
IROS
2008
IEEE
172views Robotics» more  IROS 2008»
14 years 4 months ago
Hand-eye self-calibration of an ultrasound image-based robotic system
— In recent years, there has been an increasing interest in developing systems that couple a robotic device with an ultrasound imager. Applications range from automatic probe pos...
Marie-Aude Vitrani, Guillaume Morel
ISVLSI
2008
IEEE
125views VLSI» more  ISVLSI 2008»
14 years 4 months ago
Energy Recovery from High-Frequency Clocks Using DC-DC Converters
Large digital chips use a significant amount of energy to distribute a multi-GHz clock. By discharging the clock network to ground every cycle, the energy stored in this large cap...
Mehdi Alimadadi, Samad Sheikhaei, Guy Lemieux, Sha...
ISSTA
2006
ACM
14 years 4 months ago
Architecture-driven platform independent deterministic replay for distributed hard real-time systems
Distributed hard real-time systems have become a major component of many advanced technical products. Means to ensure their proper quality are thus of paramount importance. To ens...
Holger Giese, Stefan Henkler
FPL
2003
Springer
164views Hardware» more  FPL 2003»
14 years 3 months ago
FPGA Implementations of the RC6 Block Cipher
RC6 is a symmetric-key algorithm which encrypts 128-bit plaintext blocks to 128-bit ciphertext blocks. The encryption process involves four operations: integer addition modulo 2w ,...
Jean-Luc Beuchat