Sciweavers

1079 search results - page 108 / 216
» An Implementation of an Address Generator Using Hash Memorie...
Sort
View
IPCCC
2006
IEEE
14 years 3 months ago
On capturing and containing E-mail worms
Capturing an e-mail worm and containing its propagation as early as possible is desirable in order to provide better protection for the networks and hosts against severe damage th...
Chin-Tser Huang, Nathan L. Johnson, Jeff Janies, A...
ASPDAC
2004
ACM
109views Hardware» more  ASPDAC 2004»
14 years 2 months ago
Resource-constrained low-power bus encoding with crosstalk delay elimination
— In deep-submicron (DSM) technology, minimizing power consumption of a bus is one of the most important design objectives in embedded system-on-chip (SoC) design. In this paper,...
Meeyoung Cha, Chun-Gi Lyuh, Taewhan Kim
INFOCOM
2010
IEEE
13 years 7 months ago
FlashTrie: Hash-based Prefix-Compressed Trie for IP Route Lookup Beyond 100Gbps
It is becoming apparent that the next generation IP route lookup architecture needs to achieve speeds of 100Gbps and beyond while supporting both IPv4 and IPv6 with fast real-time ...
Masanori Bando, H. Jonathan Chao
BIBE
2005
IEEE
126views Bioinformatics» more  BIBE 2005»
14 years 2 months ago
Highly Scalable and Accurate Seeds for Subsequence Alignment
We propose a method for finding seeds for the local alignment of two nucleotide sequences. Our method uses randomized algorithms to find approximate seeds. We present a dynamic ...
Abhijit Pol, Tamer Kahveci
MKM
2007
Springer
14 years 3 months ago
Automatic Synthesis of Decision Procedures: A Case Study of Ground and Linear Arithmetic
We address the problem of automatic synthesis of decision procedures. Our synthesis mechanism consists of several stages and submechanisms and is well-suited to the proof-planning ...
Predrag Janicic, Alan Bundy