Sciweavers

5675 search results - page 186 / 1135
» Exploiting Chaos for Computation
Sort
View
ICASSP
2011
IEEE
14 years 8 months ago
Hardware acceleration of iterative image reconstruction for X-ray computed tomography
X-ray computed tomography (CT) images could be improved using iterative image reconstruction if the 3D conebeam forward- and back-projection computations can be accelerated signif...
Jung Kuk Kim, Zhengya Zhang, Jeffrey A. Fessler
CAL
2011
14 years 4 months ago
Heterogeneity in "Homogeneous" Warehouse-Scale Computers: A Performance Opportunity
—The class of modern datacenters recently coined as “warehouse scale computers” (WSCs) has traditionally been embraced as homogeneous computing platforms. However, due to fre...
Jason Mars, Lingjia Tang, Robert Hundt
SAC
2009
ACM
15 years 11 months ago
Multi-step attack modelling and simulation (MsAMS) framework based on mobile ambients
Attackers take advantage of any security breach to penetrate an organisation perimeter and exploit hosts as stepping stones to reach valuable assets, deeper in the network. The exp...
Virginia N. L. Franqueira, Raul H. C. Lopes, Pasca...
ICCAD
1993
IEEE
85views Hardware» more  ICCAD 1993»
15 years 8 months ago
Input don't care sequences in FSM networks
Current approaches to compute and exploit the flexibility of a component in an FSM network are all at the symbolic level [23, 30, 33, 31]. Conventionally, exploitation of this ...
Huey-Yih Wang, Robert K. Brayton
DAC
2006
ACM
16 years 5 months ago
Systems for human-powered mobile computing
This article outlines several projects aimed at generating electrical energy by passively tapping a variety of human body sources and activities. After summarizing different energ...
Joseph A. Paradiso