Sciweavers

1414 search results - page 220 / 283
» Completion Energies and Scale
Sort
View
ISCAS
2006
IEEE
87views Hardware» more  ISCAS 2006»
14 years 3 months ago
NoC monitoring: impact on the design flow
Abstract— Networks-on-chip (NoCs) are a scalable interconnect solution to large scale multiprocessor systems on chip and are rapidly becoming reality. As the ratio of embedded co...
Calin Ciordas, Kees Goossens, Andrei Radulescu, Tw...
SBACPAD
2006
IEEE
148views Hardware» more  SBACPAD 2006»
14 years 3 months ago
Scalable Parallel Implementation of Bayesian Network to Junction Tree Conversion for Exact Inference
We present a scalable parallel implementation for converting a Bayesian network to a junction tree, which can then be used for a complete parallel implementation for exact inferen...
Vasanth Krishna Namasivayam, Animesh Pathak, Vikto...
DSN
2005
IEEE
14 years 3 months ago
Testing the Dependability and Performance of Group Communication Based Database Replication Protocols
Database replication based on group communication systems has recently been proposed as an efficient and resilient solution for large-scale data management. However, its evaluati...
A. Sousa, José Pereira, L. Soares, Alfr&aci...
GLVLSI
2005
IEEE
152views VLSI» more  GLVLSI 2005»
14 years 3 months ago
A high speed and leakage-tolerant domino logic for high fan-in gates
Robustness of high fan-in domino circuits is degraded by technology scaling due to exponential increase in leakage. In this paper, we propose a new domino circuit for high fan-in ...
Farshad Moradi, Hamid Mahmoodi-Meimand, Ali Peirav...
HOTI
2005
IEEE
14 years 3 months ago
SIFT: Snort Intrusion Filter for TCP
Intrusion rule processing in reconfigurable hardware enables intrusion detection and prevention services to run at multi Gigabit/second rates. High-level intrusion rules mapped d...
Michael Attig, John W. Lockwood