Sciweavers

2945 search results - page 98 / 589
» Designing and Implementing Malicious Hardware
Sort
View
FCCM
2009
IEEE
316views VLSI» more  FCCM 2009»
15 years 8 months ago
An FPGA Implementation for Solving Least Square Problem
This paper proposes a high performance least square solver on FPGAs using the Cholesky decomposition method. Our design can be realized by iteratively adopting a single triangular...
Depeng Yang, Gregory D. Peterson, Husheng Li, Junq...
ICCD
1997
IEEE
140views Hardware» more  ICCD 1997»
15 years 8 months ago
Parallel-Array Implementations of a Non-Restoring Square Root Algorithm
In this paper, we present a parallel-array implementation of a new non-restoring square root algorithm (PASQRT). The carry-save adder (CSA) is used in the parallel array. The PASQ...
Yamin Li, Wanming Chu
FCCM
2002
IEEE
143views VLSI» more  FCCM 2002»
15 years 9 months ago
An FPGA Implementation of Triangle Mesh Decompression
This paper presents an FPGA-based design and implementation of a three dimensional (3D) triangle mesh decompressor. Triangle mesh is the dominant representation of 3D geometric mo...
Tulika Mitra, Tzi-cker Chiueh
CCS
2008
ACM
15 years 6 months ago
SNAPP: stateless network-authenticated path pinning
This paper examines a new building block for next-generation networks: SNAPP, or Stateless Network-Authenticated Path Pinning. SNAPP-enabled routers securely embed their routing d...
Bryan Parno, Adrian Perrig, Dave Andersen
DATE
2007
IEEE
97views Hardware» more  DATE 2007»
15 years 10 months ago
Systematic comparison between the asynchronous and the multi-synchronous implementations of a network on chip architecture
In this paper we present a systematic comparison between two different implementations of a distributed Network on Chip: fully asynchronous and multi-synchronous. The NoC architec...
Abbas Sheibanyrad, Ivan Miro Panades, Alain Greine...