Sciweavers

647 search results - page 81 / 130
» Generation of BDDs from hardware algorithm descriptions
Sort
View
ICCV
2011
IEEE
12 years 8 months ago
BRISK: Binary Robust Invariant Scalable Keypoints
Effective and efficient generation of keypoints from an image is a well-studied problem in the literature and forms the basis of numerous Computer Vision applications. Establishe...
Stefan Leutenegger, Margarita Chli, Roland Y. Sieg...
ASPDAC
2009
ACM
155views Hardware» more  ASPDAC 2009»
14 years 2 months ago
Variation-aware resource sharing and binding in behavioral synthesis
— As technology scales, the delay uncertainty caused by process variations has become increasingly pronounced in deep submicron designs. In the presence of process variations, wo...
Feng Wang 0004, Yuan Xie, Andres Takach
ISCAS
2008
IEEE
132views Hardware» more  ISCAS 2008»
14 years 2 months ago
Thermal aware clock synthesis considering stochastic variation and correlations
— In this paper, we have proposed a thermal aware routing based parameterization to generate a clock model that takes the stochastic temperature variation into consideration. The...
Chunchen Liu, Ruei-Xi Chen, Jichang Tan, Sharon Fa...
FPL
2006
Springer
103views Hardware» more  FPL 2006»
13 years 11 months ago
Modular Partitioning for Incremental Compilation
This paper presents an automated partitioning strategy to divide a design into a set of partitions based on design hierarchy information. While the primary objective is to use the...
Mehrdad Eslami Dehkordi, Stephen Dean Brown, Terry...
FSE
2006
Springer
109views Cryptology» more  FSE 2006»
13 years 11 months ago
Cryptanalysis of the Stream Cipher DECIM
DECIM is a hardware oriented stream cipher with an 80-bit key and a 64-bit IV. In this paper, we point out two serious flaws in DECIM. One flaw is in the initialization of DECIM. I...
Hongjun Wu, Bart Preneel