Sciweavers

1084 search results - page 96 / 217
» Design and Evaluation of a Selective Compressed Memory Syste...
Sort
View
CASES
2005
ACM
15 years 6 months ago
Exploring the design space of LUT-based transparent accelerators
Instruction set customization accelerates the performance of applications by compressing the length of critical dependence paths and reducing the demands on processor resources. W...
Sami Yehia, Nathan Clark, Scott A. Mahlke, Kriszti...
IPSN
2005
Springer
15 years 10 months ago
Design considerations for solar energy harvesting wireless embedded systems
Abstract— Sustainable operation of battery powered wireless embedded systems (such as sensor nodes) is a key challenge, and considerable research effort has been devoted to energ...
Vijay Raghunathan, Aman Kansal, Jason Hsu, Jonatha...
JTRES
2010
ACM
15 years 4 months ago
WCET driven design space exploration of an object cache
In order to guarantee that real-time systems meet their timing specification, static execution time bounds need to be calculated. Not considering execution time predictability led...
Benedikt Huber, Wolfgang Puffitsch, Martin Schoebe...
TCC
2010
Springer
381views Cryptology» more  TCC 2010»
16 years 1 months ago
New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts
We construct a fully secure HIBE scheme with short ciphertexts. The previous construction of Boneh, Boyen, and Goh was only proven to be secure in the selective model, under a non...
Allison B. Lewko, Brent Waters
CVPR
2007
IEEE
15 years 10 months ago
Surveillance in Virtual Reality: System Design and Multi-Camera Control
This paper advocates a Virtual Vision paradigm and demonstrates its usefulness in camera sensor network research. Virtual vision prescribes the use of a visually and behaviorally ...
Faisal Qureshi, Demetri Terzopoulos