Sciweavers

2018 search results - page 287 / 404
» Code Normal Forms
Sort
View
ICCD
2000
IEEE
124views Hardware» more  ICCD 2000»
16 years 1 months ago
Processors for Mobile Applications
: Mobile processors form a large and very fast growing segment of semiconductor market. Although they are used in a great variety of embedded systems such as personal digital organ...
Farinaz Koushanfar, Miodrag Potkonjak, Vandana Pra...
CGO
2008
IEEE
15 years 11 months ago
Compiling for vector-thread architectures
Vector-thread (VT) architectures exploit multiple forms of parallelism simultaneously. This paper describes a compiler for the Scale VT architecture, which takes advantage of the ...
Mark Hampton, Krste Asanovic
ICC
2007
IEEE
121views Communications» more  ICC 2007»
15 years 10 months ago
Peak to Average Power Reduction for Low-Power OFDM Systems
— For Orthogonal Frequency-Division Multiplexing (OFDM) systems, Peak to Average Power Ratio (PAPR) can be a major impediment to efficient transmission due to the need to use in...
Everest W. Huang, Gregory W. Wornell
ISCAS
2007
IEEE
117views Hardware» more  ISCAS 2007»
15 years 10 months ago
Quantifying Input and Output Spike Statistics of a Winner-Take-All Network in a Vision System
— Event-driven spike-based processing systems offer new possibilities for real-time vision. Signals are encoded asynchronously in time thus preserving the time information of the...
Matthias Oster, Rodney J. Douglas, Shih-Chii Liu
CTRSA
2007
Springer
110views Cryptology» more  CTRSA 2007»
15 years 10 months ago
Selecting Secure Passwords
We mathematically explore a model for the shortness and security for passwords that are stored in hashed form. The model is implicitly in the NIST publication [8] and is based on c...
Eric R. Verheul