Sciweavers

2945 search results - page 135 / 589
» Designing and Implementing Malicious Hardware
Sort
View
EUROMICRO
2000
IEEE
15 years 9 months ago
A Simulink(c)-Based Approach to System Level Design and Architecture Selection
We propose a design flow for low-power and low-cost, data-dominated, embedded systems which tightly integrate different technologies and architectures. We use Mathworks’ Simuli...
Luciano Lavagno, Begoña Pino, Leonardo Mari...
JSA
2008
108views more  JSA 2008»
15 years 4 months ago
A methodology to design arbitrary failure detectors for distributed protocols
Nowadays, there are many protocols able to cope with process crashes, but, unfortunately, a process crash represents only a particular faulty behavior. Handling tougher failures (...
Roberto Baldoni, Jean-Michel Hélary, Sara T...
SASP
2009
IEEE
291views Hardware» more  SASP 2009»
15 years 11 months ago
A parameterisable and scalable Smith-Waterman algorithm implementation on CUDA-compatible GPUs
—This paper describes a multi-threaded parallel design and implementation of the Smith-Waterman (SM) algorithm on compute unified device architecture (CUDA)-compatible graphic pr...
Cheng Ling, Khaled Benkrid, Tsuyoshi Hamada
ISSS
1997
IEEE
142views Hardware» more  ISSS 1997»
15 years 9 months ago
Optimization Method for Broadband Modem FIR Filter Design using Common Subexpression Elimination
- An approach for broadband modem FIR filter design optimization is presented. It addresses the minimization of the number of addersubtractors used in the hardware implementation o...
Robert Pasko, Patrick Schaumont, Veerle Derudder, ...
APCCAS
2006
IEEE
269views Hardware» more  APCCAS 2006»
15 years 6 months ago
A Memory Bandwidth Optimized Interpolator for Motion Compensation in the H.264 Video Decoding
The paper presents an interpolator design for motion compensation used in the H.264 video decoding. The presented design is optimized according to the available data bandwidth to a...
Tzu-Yun Kuo, Yu-Kun Lin, Tian-Sheuan Chang