Sciweavers

327 search results - page 53 / 66
» Automatic Array Privatization
Sort
View
IEEEPACT
2008
IEEE
14 years 4 months ago
Exploiting loop-dependent stream reuse for stream processors
The memory access limits the performance of stream processors. By exploiting the reuse of data held in the Stream Register File (SRF), an on-chip storage, the number of memory acc...
Xuejun Yang, Ying Zhang, Jingling Xue, Ian Rogers,...
AVSS
2007
IEEE
14 years 4 months ago
Scream and gunshot detection and localization for audio-surveillance systems
This paper describes an audio-based video surveillance system which automatically detects anomalous audio events in a public square, such as screams or gunshots, and localizes the...
Giuseppe Valenzise, Luigi Gerosa, Marco Tagliasacc...
ISVLSI
2007
IEEE
181views VLSI» more  ISVLSI 2007»
14 years 4 months ago
Code-coverage Based Test Vector Generation for SystemC Designs
Abstract— Time-to-Market plays a central role on System-ona-Chip (SoC) competitiveness and the quality of the final product is a matter of concern as well. As SoCs complexity in...
Alair Dias Jr., Diógenes Cecilio da Silva J...
FPL
2007
Springer
111views Hardware» more  FPL 2007»
14 years 3 months ago
Adaptive Thermoregulation for Applications on Reconfigurable Devices
A biological organism’s ability to sense and adapt to its environment is essential to its survival. Likewise, environmentally aware computing systems avail themselves to a longe...
Phillip H. Jones, James Moscola, Young H. Cho, Joh...
ACMSE
2006
ACM
14 years 3 months ago
Type inference and informative error reporting for secure information flow
If we classify the variables of a program into various security levels, then a secure information flow analysis aims to verify statically that information in the program can flo...
Zhenyue Deng, Geoffrey Smith