Sciweavers

2945 search results - page 19 / 589
» Designing and Implementing Malicious Hardware
Sort
View
ISAAC
2007
Springer
109views Algorithms» more  ISAAC 2007»
15 years 10 months ago
Manipulation in Games
This paper studies to which extent the social welfare of a game can be influenced by an interested third party within economic reason, i.e., by taking the implementation cost into...
Raphael Eidenbenz, Yvonne Anne Oswald, Stefan Schm...
ASPDAC
2009
ACM
105views Hardware» more  ASPDAC 2009»
15 years 8 months ago
Design and chip implementation of the ubiquitous processor HCgorilla
Masa-Aki Fukase, Kazunori Noda, Atsuko Yokoyama, T...
118
Voted
ICCD
2005
IEEE
224views Hardware» more  ICCD 2005»
16 years 23 days ago
Algorithmic and Architectural Design Methodology for Particle Filters in Hardware
In this paper we present algorithmic and architectural methodology for building Particle Filters in hardware. Particle filtering is a new paradigm for filtering in presence of n...
Aswin C. Sankaranarayanan, Rama Chellappa, Ankur S...
149
Voted
DCC
2008
IEEE
15 years 5 months ago
Design and Implementation of a High-Performance Microprocessor Cache Compression Algorithm
Researchers have proposed using hardware data compression units within the memory hierarchies of microprocessors in order to improve performance, energy efficiency, and functional...
Xi Chen, Lei Yang, Haris Lekatsas, Robert P. Dick,...