Sciweavers

5675 search results - page 56 / 1135
» Exploiting Chaos for Computation
Sort
View
WICON
2008
14 years 13 days ago
Exploiting parallel networks using dynamic channel scheduling
Many researchers have been focusing on the outcomes and consequences of the rapid increase and proliferation of mobile wireless technologies. If it is not already the case, it wil...
Lara B. Deek, Kevin C. Almeroth, Mike P. Wittie, K...
IPPS
2007
IEEE
14 years 5 months ago
Load Miss Prediction - Exploiting Power Performance Trade-offs
— Modern CPUs operate at GHz frequencies, but the latencies of memory accesses are still relatively large, in the order of hundreds of cycles. Deeper cache hierarchies with large...
Konrad Malkowski, Greg M. Link, Padma Raghavan, Ma...
ASPDAC
2004
ACM
72views Hardware» more  ASPDAC 2004»
14 years 4 months ago
Exploiting state encoding for invariant generation in induction-based property checking
— This paper focuses on checking safety properties for sequential circuits specified on the RTlevel. We study how different state encodings can be used to create a gate-level r...
Markus Wedler, Dominik Stoffel, Wolfgang Kunz
CHES
2008
Springer
108views Cryptology» more  CHES 2008»
14 years 1 months ago
Exploiting the Power of GPUs for Asymmetric Cryptography
Modern Graphics Processing Units (GPU) have reached a dimension with respect to performance and gate count exceeding conventional Central Processing Units (CPU) by far. Many modern...
Robert Szerwinski, Tim Güneysu
PRDC
2006
IEEE
14 years 5 months ago
Detecting and Exploiting Symmetry in Discrete-state Markov Models
Dependable systems are usually designed with multiple instances of components or logical processes, and often possess symmetries that may be exploited in model-based evaluation. T...
W. Douglas Obal II, Michael G. McQuinn, William H....