Sciweavers

1722 search results - page 19 / 345
» Dedication
Sort
View
FPL
2007
Springer
136views Hardware» more  FPL 2007»
14 years 4 months ago
A Load/Store Unit for a Memcpy Hardware Accelerator
Recently, a dedicated hardware accelerator was proposed that works in conjunction with caches found next to modern-day microprocessors, to speedup the commonly utilized memcpy ope...
Stamatis Vassiliadis, Filipa Duarte, Stephan Wong
ICN
2007
Springer
14 years 4 months ago
Bandwidth Scheduling and Path Computation Algorithms for Connection-Oriented Networks
There has been an increasing number of network deployments that provide dedicated connections through on-demand and in-advance scheduling in support of highperformance application...
Sartaj Sahni, Nageshwara Rao, Sanjay Ranka, Yan Li...
CDC
2009
IEEE
136views Control Systems» more  CDC 2009»
13 years 11 months ago
Refined instrumental variable methods for identifying hammerstein models operating in closed loop
This article presents an instrumental variable method dedicated to non-linear Hammerstein systems operating in closed loop. The linear process is a Box
Vincent Laurain, Marion Gilson, Hugues Garnier
APAL
2007
65views more  APAL 2007»
13 years 10 months ago
Increasing the groupwise density number by c.c.c. forcing
We show that ℵ2 ≤ b < g is consistent. This work is dedicated to James Baumgartner on the occasion of his 60th birthday.
Heike Mildenberger, Saharon Shelah
SCN
2008
Springer
141views Communications» more  SCN 2008»
13 years 9 months ago
Improved Privacy of the Tree-Based Hash Protocols Using Physically Unclonable Function
In 2004, Molnar and Wagner introduced a very appealing scheme dedicated to the identification of RFID tags. Their protocol relies on a binary tree of secrets which are shared
Julien Bringer, Hervé Chabanne, Thomas Icar...