Sciweavers

4647 search results - page 198 / 930
» Composite Design Patterns
Sort
View
SIGCOMM
2009
ACM
14 years 5 months ago
GrassRoots: socially-driven web sites for the masses
Large, socially-driven Web 2.0 sites such as Facebook and Youtube have seen significant growth in popularity [5, 10]. However, strong demand also exists for socially-driven web s...
Frank Uyeda, Diwaker Gupta, Amin Vahdat, George Va...
GLVLSI
2007
IEEE
158views VLSI» more  GLVLSI 2007»
14 years 12 days ago
RT-level vector selection for realistic peak power simulation
We present a vector selection methodology for estimating the peak power dissipation in a CMOS logic circuit. The ultimate goal is to combine the speed of RT-level simulation with ...
Chia-Chien Weng, Ching-Shang Yang, Shi-Yu Huang
FPGA
2005
ACM
137views FPGA» more  FPGA 2005»
14 years 4 months ago
HARP: hard-wired routing pattern FPGAs
Modern FPGA architectures provide ample routing resources so that designs can be routed successfully. The routing architecture is designed to handle versatile connection configur...
Satish Sivaswamy, Gang Wang, Cristinel Ababei, Kia...
ICRA
2002
IEEE
161views Robotics» more  ICRA 2002»
14 years 3 months ago
A Method for Co-Evolving Morphology and Walking Pattern of Biped Humanoid Robot
— In this paper, we present a method for co-evolving structures and controller of biped walking robots. Currently, biped walking humanoid robots are designed manually on trial-an...
Ken Endo, Fuminori Yamasaki, Takashi Maeno, Hiroak...
ITCC
2005
IEEE
14 years 4 months ago
Conversion and Proxy Functions for Symmetric Key Ciphers
As a general design criterion, a symmetric key cipher should not be closed under functional composition due to the implications on the security of the cipher. However, there are s...
Debra L. Cook, Angelos D. Keromytis