Sciweavers

1075 search results - page 40 / 215
» Calculating the Number of Tunnels
Sort
View
ISSS
1996
IEEE
134views Hardware» more  ISSS 1996»
14 years 20 days ago
ADOPT: Efficient Hardware Address Generation in Distributed Memory Architectures
An address generation and optimization environment (ADOPT) for distributed memory architectures, is presented. ADOPT is oriented to minimize the area overhead introduced by the us...
Miguel Miranda, Francky Catthoor, Martin Janssen, ...
ARITH
2007
IEEE
14 years 14 days ago
An Algorithm for Inversion in GF(2^m) Suitable for Implementation Using a Polynomial Multiply Instruction on GF(2)
An algorithm for inversion in GF(2m ) suitable for implementation using a polynomial multiply instruction on GF(2) is proposed. It is based on the extended Euclid's algorithm...
Katsuki Kobayashi, Naofumi Takagi, Kazuyoshi Takag...
ISLPED
1995
ACM
85views Hardware» more  ISLPED 1995»
14 years 1 days ago
Estimation of energy consumption in speed-independent control circuits
Abstract: We describe a technique to estimate the energy consumed by speed-independent asynchronous (clockless) control circuits. Because speed-independent circuits are hazard-free...
Peter A. Beerel, Cheng-Ta Hsieh, Suhrid A. Wadekar
FPL
2008
Springer
153views Hardware» more  FPL 2008»
13 years 10 months ago
FPGA acceleration of quasi-Monte Carlo in finance
Today, quasi-Monte Carlo (QMC) methods are widely used in finance to price derivative securities. The QMC approach is popular because for many types of derivatives it yields an es...
Nathan A. Woods, Tom VanCourt
WCET
2007
13 years 9 months ago
Data-Flow Based Detection of Loop Bounds
To calculate the WCET of a program, safe upper bounds on the number of loop iterations for all loops in the program are needed. As the manual annotation of all loops with such bou...
Christoph Cullmann, Florian Martin