Sciweavers

2945 search results - page 137 / 589
» Designing and Implementing Malicious Hardware
Sort
View
HICSS
1994
IEEE
152views Biometrics» more  HICSS 1994»
15 years 8 months ago
Simple COMA Node Implementations
Shared memory architectures often have caches to reduce the number of slow remote memory accesses. The largest possible caches exist in shared memory architectures called Cache-On...
Erik Hagersten, Ashley Saulsbury, Anders Landin
DATE
2008
IEEE
91views Hardware» more  DATE 2008»
15 years 11 months ago
Integrating RTL IPs into TLM Designs Through Automatic Transactor Generation
Transaction Level Modeling (TLM) is an emerging design practice for overcoming increasing design complexity. It aims at simplifying the design flow of embedded systems ning and v...
Nicola Bombieri, Nicola Deganello, Franco Fummi
DATE
2007
IEEE
102views Hardware» more  DATE 2007»
15 years 11 months ago
Use of statistical timing analysis on real designs
A vast literature has been published on Statistical Static Timing Analysis (SSTA), its motivations, its different implementations and their runtime/accuracy trade-offs. However, v...
A. Nardi, Emre Tuncer, S. Naidu, A. Antonau, S. Gr...
EH
2003
IEEE
116views Hardware» more  EH 2003»
15 years 10 months ago
Silicon Validation of Evolution-Designed Circuits
No silicon fabrication and characterization of circuits with topologies designed by evolution has been done before, leaving open questions about the feasibility of the evolutionar...
Adrian Stoica, Ricardo Salem Zebulum, Xin Guo, Did...
145
Voted
EUROMICRO
2007
IEEE
15 years 11 months ago
A Light-Weight Implementation Scheme of the Tree Morphing Protocol for Mobile Multicast Sources
Multicast network services advantageously complement multimedia information and communication technologies, as they open up the realm for highly scalable multicustomer application...
Olaf Christ, Thomas C. Schmidt, Matthias Wähl...