Sciweavers

2018 search results - page 287 / 404
» Code Normal Forms
Sort
View
ICCD
2000
IEEE
124views Hardware» more  ICCD 2000»
14 years 5 months ago
Processors for Mobile Applications
: Mobile processors form a large and very fast growing segment of semiconductor market. Although they are used in a great variety of embedded systems such as personal digital organ...
Farinaz Koushanfar, Miodrag Potkonjak, Vandana Pra...
CGO
2008
IEEE
14 years 3 months ago
Compiling for vector-thread architectures
Vector-thread (VT) architectures exploit multiple forms of parallelism simultaneously. This paper describes a compiler for the Scale VT architecture, which takes advantage of the ...
Mark Hampton, Krste Asanovic
ICC
2007
IEEE
121views Communications» more  ICC 2007»
14 years 3 months ago
Peak to Average Power Reduction for Low-Power OFDM Systems
— For Orthogonal Frequency-Division Multiplexing (OFDM) systems, Peak to Average Power Ratio (PAPR) can be a major impediment to efficient transmission due to the need to use in...
Everest W. Huang, Gregory W. Wornell
ISCAS
2007
IEEE
117views Hardware» more  ISCAS 2007»
14 years 3 months ago
Quantifying Input and Output Spike Statistics of a Winner-Take-All Network in a Vision System
— Event-driven spike-based processing systems offer new possibilities for real-time vision. Signals are encoded asynchronously in time thus preserving the time information of the...
Matthias Oster, Rodney J. Douglas, Shih-Chii Liu
CTRSA
2007
Springer
110views Cryptology» more  CTRSA 2007»
14 years 3 months ago
Selecting Secure Passwords
We mathematically explore a model for the shortness and security for passwords that are stored in hashed form. The model is implicitly in the NIST publication [8] and is based on c...
Eric R. Verheul