Sciweavers

2945 search results - page 517 / 589
» Designing and Implementing Malicious Hardware
Sort
View
USENIX
2008
15 years 6 months ago
Cutting Corners: Workbench Automation for Server Benchmarking
A common approach to benchmarking a server is to measure its behavior under load from a workload generator. Often a set of such experiments is required-perhaps with different serv...
Piyush Shivam, Varun Marupadi, Jeffrey S. Chase, T...
ARITH
2005
IEEE
15 years 6 months ago
Quasi-Pipelined Hash Circuits
Hash functions are an important cryptographic primitive. They are used to obtain a fixed-size fingerprint, or hash value, of an arbitrary long message. We focus particularly on ...
Marco Macchetti, Luigi Dadda
ERSA
2007
86views Hardware» more  ERSA 2007»
15 years 5 months ago
High-Precision BLAS on FPGA-enhanced Computers
The emergence of high-density reconfigurable hardware devices gives scientists and engineers an option to accelerating their numerical computing applications on low-cost but power...
Chuan He, Guan Qin, Richard E. Ewing, Wei Zhao
VISSYM
2004
15 years 5 months ago
Medical Applications of Multi-field Volume Rendering and VR Techniques
This paper reports on a new approach for visualizing multi-field MRI or CT datasets in an immersive environment with medical applications. Multi-field datasets combine multiple sc...
Joe Kniss, Jürgen P. Schulze, Uwe Wössne...
BIOSYSTEMS
2007
92views more  BIOSYSTEMS 2007»
15 years 4 months ago
A phase-based stereo vision system-on-a-chip
A simple and fast technique for depth estimation based on phase measurement has been adopted for the implementation of a real-time stereo system with sub-pixel resolution on an FP...
Javier Díaz, Eduardo Ros, Silvio P. Sabatin...