Sciweavers

2945 search results - page 120 / 589
» Designing and Implementing Malicious Hardware
Sort
View
ISCAS
2005
IEEE
113views Hardware» more  ISCAS 2005»
15 years 10 months ago
On the robustness of an analog VLSI implementation of a time encoding machine
Abstract— Time encoding is a mechanism for representing the information contained in a continuous time, bandlimited, analog signal as the zero-crossings of a binary signal. Time ...
Peter R. Kinget, Aurel A. Lazar, Laszlo T. Toth
ISMVL
2010
IEEE
191views Hardware» more  ISMVL 2010»
15 years 9 months ago
Toffoli Gate Implementation Using the Billiard Ball Model
— In this paper we review the Billiard Ball Model (BBM) introduced by Toffoli and Fredkin. The analysis of a previous approach to design reversible networks based on BBM it shown...
Hadi Hosseini, Gerhard W. Dueck
CATA
2003
15 years 6 months ago
A Programmable Logic-Based Implementation of Ultra-Fast Parallel Binary Image Morphological Operations
Binary morphological operations are a building block in many computer vision applications. Several iterative morphological operations are commonly performed for image analysis res...
Songpol Ongwattanakul, Phaisit Chewputtanagul, Dav...
ICCD
2008
IEEE
117views Hardware» more  ICCD 2008»
16 years 1 months ago
Two dimensional highly associative level-two cache design
High associativity is important for level-two cache designs [9]. Implementing CAM-based Highly Associative Caches (CAM-HAC), however, is both costly in hardware and exhibits poor s...
Chuanjun Zhang, Bing Xue
FPL
2009
Springer
105views Hardware» more  FPL 2009»
15 years 9 months ago
Towards a viable out-of-order soft core: Copy-Free, checkpointed register renaming
As a step torward a viable, single-issue out-of-order soft core, this work presents Copy-Free Checkpointing (CFC), an FPGA-friendly register renaming design. CFC supports speculat...
Kaveh Aasaraai, Andreas Moshovos