Sciweavers

2945 search results - page 56 / 589
» Designing and Implementing Malicious Hardware
Sort
View
APCCAS
2006
IEEE
251views Hardware» more  APCCAS 2006»
15 years 10 months ago
Implementation of a H.264 decoder with Template-based Communication Refinement
We described an H.264 decoder implemented with our design methodology, in which a system function model of transaction level is first captured in SystemC and refined into RTL with ...
Sang-yong Yoon, Sanggyu Park, Soolk Chae
ASYNC
2004
IEEE
133views Hardware» more  ASYNC 2004»
15 years 7 months ago
An Asynchronous, Iterative Implementation of the Original Booth Multiplication Algorithm
One of the main reasons for using asynchronous design is that it offers the opportunity to exploit the datadependent latency of many operations in order to achieve low-power, high...
Aristides Efthymiou, W. Suntiamorntut, Jim D. Gars...
OOPSLA
2009
Springer
15 years 10 months ago
A concurrent dynamic analysis framework for multicore hardware
Software has spent the bounty of Moore’s law by solving harder problems and exploiting abstractions, such as highlevel languages, virtual machine technology, binary rewritdynami...
Jungwoo Ha, Matthew Arnold, Stephen M. Blackburn, ...
TVLSI
2008
187views more  TVLSI 2008»
15 years 4 months ago
A Design Flow for Architecture Exploration and Implementation of Partially Reconfigurable Processors
During the last years, the growing application complexity, design, and mask costs have compelled embedded system designers to increasingly consider partially reconfigurable applica...
Kingshuk Karuri, Anupam Chattopadhyay, Xiaolin Che...
ISSS
1997
IEEE
83views Hardware» more  ISSS 1997»
15 years 8 months ago
A Scheduling and Pipelining Algorithm for Hardware/Software Systems
Given a hardware/software partitioned specification and an allocation (number and type) of processors, we present an algorithm to (1) map each of the software behaviors (or tasks...
Smita Bakshi, Daniel Gajski