Sciweavers

1016 search results - page 135 / 204
» Explore or Exploit
Sort
View
MTV
2005
IEEE
128views Hardware» more  MTV 2005»
14 years 2 months ago
Automated Extraction of Structural Information from SystemC-based IP for Validation
The increasing complexity and size of system level design models introduces a difficult challenge for validating them. Hence, in most industries, design validation takes a large p...
David Berner, Hiren D. Patel, Deepak Mathaikutty, ...
EUROPAR
2005
Springer
14 years 2 months ago
A Detailed Study on Phase Predictors
Most programs are repetitive, meaning that some parts of a program are executed more than once. As a result, a number of phases can be extracted in which each phase exhibits simila...
Frederik Vandeputte, Lieven Eeckhout, Koen De Boss...
FPL
2005
Springer
111views Hardware» more  FPL 2005»
14 years 2 months ago
Mutable Codesign for Embedded Protocol Processing
This paper addresses exploitation of the capabilities of platform FPGAs to implement embedded networking for systems on chip. In particular, a methodology for exploring trade-offs...
Todd S. Sproull, Gordon J. Brebner, Christopher E....
ICANN
2005
Springer
14 years 2 months ago
Evolving Modular Fast-Weight Networks for Control
Abstract. In practice, almost all control systems in use today implement some form of linear control. However, there are many tasks for which conventional control engineering metho...
Faustino J. Gomez, Jürgen Schmidhuber
IPTPS
2005
Springer
14 years 2 months ago
A First Look at Peer-to-Peer Worms: Threats and Defenses
Abstract— Peer-to-peer (P2P) worms exploit common vulnerabilities in member hosts of a P2P network and spread topologically in the P2P network, a potentially more effective strat...
Lidong Zhou, Lintao Zhang, Frank McSherry, Nicole ...