Sciweavers

2945 search results - page 116 / 589
» Designing and Implementing Malicious Hardware
Sort
View
INFORMATICALT
2002
54views more  INFORMATICALT 2002»
15 years 4 months ago
Separation Of Concerns in Multi-language Specifications
Abstract. We present an analysis of the separation of concerns in multi-language design and multilanguage specifications. The basis for our analysis is the paradigm of the multi-di...
Robertas Damasevicius, Vytautas Stuikys
164
Voted
ICCAD
2003
IEEE
154views Hardware» more  ICCAD 2003»
16 years 1 months ago
Fast, Accurate Static Analysis for Fixed-Point Finite-Precision Effects in DSP Designs
Translating digital signal processing (DSP) software into its finite-precision hardware implementation is often a timeconsuming task. We describe a new static analysis technique ...
Claire Fang Fang, Rob A. Rutenbar, Tsuhan Chen
141
Voted
ERSA
2007
174views Hardware» more  ERSA 2007»
15 years 6 months ago
High-Level Specification of Runtime Reconfigurable Designs
”C to Gates” compilers for FPGAs have been a topic of investigation for nearly two decades. Some of these endeavors have reached a point of viability. Impulse C, for example, ...
Stephen D. Craven, Peter M. Athanas
FPGA
2006
ACM
224views FPGA» more  FPGA 2006»
15 years 8 months ago
Flexible implementation of genetic algorithms on FPGAs
In this paper, we propose a technique to flexibly implement genetic algorithms for various problems on FPGAs. For the purpose, we propose a basic architecture for GA which consist...
Tatsuhiro Tachibana, Yoshihiro Murata, Naoki Shiba...
ICC
2007
IEEE
144views Communications» more  ICC 2007»
15 years 11 months ago
A Deterministic Cost-effective String Matching Algorithm for Network Intrusion Detection System
—Network Intrusion Detection Systems (NIDS) are more and more important in today’s network security for identifying and preventing malicious attacks over the network. This pape...
Nen-Fu Huang, Yen-Ming Chu, Chen-Ying Hsieh, Chi-H...