Sciweavers

4330 search results - page 849 / 866
» Analyzing security architectures
Sort
View
DATE
2003
IEEE
101views Hardware» more  DATE 2003»
14 years 1 days ago
Energy Estimation for Extensible Processors
This paper presents an efficient methodology for estimating the energy consumption of application programs running on extensible processors. Extensible processors, which are incr...
Yunsi Fei, Srivaths Ravi, Anand Raghunathan, Niraj...
ICRA
2003
IEEE
126views Robotics» more  ICRA 2003»
14 years 20 hour ago
Experimental analysis of an innovative prosthetic hand with proprioceptive sensors
— This paper presents an underactuated artificial hand intended for functional replacement of the natural hand in upper limb amputees. The natural hand has three basic functiona...
Maria Chiara Carrozza, Fabrizio Vecchi, F. Sebasti...
IPPS
2003
IEEE
14 years 17 hour ago
Cost/Performance Tradeoffs in Network Interconnects for Clusters of Commodity PCs
The definition of a commodity component is quite obvious when it comes to the PC as a basic compute engine and building block for clusters of PCs. Looking at the options for a mo...
Christian Kurmann, Felix Rauch, Thomas Stricker
RTSS
2003
IEEE
14 years 9 hour ago
Data Caches in Multitasking Hard Real-Time Systems
Data caches are essential in modern processors, bridging the widening gap between main memory and processor speeds. However, they yield very complex performance models, which make...
Xavier Vera, Björn Lisper, Jingling Xue
CASES
2003
ACM
13 years 12 months ago
A low-power accelerator for the SPHINX 3 speech recognition system
Accurate real-time speech recognition is not currently possible in the mobile embedded space where the need for natural voice interfaces is clearly important. The continuous natur...
Binu K. Mathew, Al Davis, Zhen Fang