Sciweavers

2945 search results - page 44 / 589
» Designing and Implementing Malicious Hardware
Sort
View
SIGCOMM
2010
ACM
15 years 4 months ago
NapSAC: design and implementation of a power-proportional web cluster
Energy consumption is a major and costly problem in data centers. A large fraction of this energy goes to powering idle machines that are not doing any useful work. We identify tw...
Andrew Krioukov, Prashanth Mohan, Sara Alspaugh, L...
134
Voted
DATE
2009
IEEE
159views Hardware» more  DATE 2009»
15 years 10 months ago
Design and implementation of a database filter for BLAST acceleration
— BLAST is a very popular Computational Biology algorithm. Since it is computationally expensive it is a natural target for acceleration research, and many reconfigurable archite...
Panagiotis Afratis, Constantinos Galanakis, Euripi...
ICRA
2005
IEEE
144views Robotics» more  ICRA 2005»
15 years 9 months ago
Extensible Hardware Architecture for Mobile Robots
— The Intelligent Robotics Group at NASA Ames Research Center has developed a new mobile robot hardware architecture designed for extensibility and reconfigurability. Currently ...
Eric Park, Linda Kobayashi, Susan Y. Lee
ISCAS
2003
IEEE
75views Hardware» more  ISCAS 2003»
15 years 9 months ago
VLSI implementation of a real-time video watermark embedder and detector
This paper describes the hardware design and implementation of the JAWS (Just Another Watermarking System) embedder and detector for watermarking of realtime uncompressed digital ...
Nebu John Muthui, Ali Sheikholeslami, Deepa Kundur
153
Voted
IMCSIT
2010
15 years 1 months ago
Software and hardware in the loop component for an IEC 61850 Co-Simulation platform
The deployment of IEC61850 standard in the world of substation automation system brings to the use of specific strategies for architecture testing. To validate IEC61850 architectur...
Haffar Mohamad, Thiriet Jean Marc