Sciweavers

65 search results - page 11 / 13
» Evaluating register file size in ASIP design
Sort
View
CSREASAM
2006
14 years 8 days ago
A Study on DRM System for On/Off Line Key Authentication
- This paper proposes a Hash Chain algorithm to create a key safer than the existing encryption method, and suggests an encryption method of higher security than the existing syste...
Kun-Won Jang, Chan-Kil Park, Jung-Jae Kim, Moon-Se...
ISCA
1996
IEEE
99views Hardware» more  ISCA 1996»
14 years 3 months ago
High-Bandwidth Address Translation for Multiple-Issue Processors
In an effort to push the envelope of system performance, microprocessor designs are continually exploiting higher levels of instruction-level parallelism, resulting in increasing ...
Todd M. Austin, Gurindar S. Sohi
PVLDB
2008
110views more  PVLDB 2008»
13 years 10 months ago
Online maintenance of very large random samples on flash storage
Recent advances in flash media have made it an attractive alternative for data storage in a wide spectrum of computing devices, such as embedded sensors, mobile phones, PDA's...
Suman Nath, Phillip B. Gibbons
ICCNMC
2005
Springer
14 years 4 months ago
Simplified Message Transformation for Optimization of Message Processing in 3G-324M Control Protocol
3G-324M is a multimedia transmission protocol designed for 3G communication environment. Meanwhile H.245 standard is a control protocol in 3G-324M and gives specific descriptions a...
Man-Ching Yuen, Ji Shen, Weijia Jia, Bo Han
GECCO
2004
Springer
148views Optimization» more  GECCO 2004»
14 years 4 months ago
A Multi-objective Approach to Configuring Embedded System Architectures
Portable embedded systems are being driven by consumer demands to be thermally efficient, perform faster, and have longer battery life. To design such a system, various hardware un...
James Northern III, Michael A. Shanblatt