Sciweavers

1658 search results - page 257 / 332
» Implementing Bit-addressing with Specialization
Sort
View
SENSYS
2010
ACM
13 years 7 months ago
Adaptive decentralized control of underwater sensor networks for modeling underwater phenomena
Understanding the dynamics of bodies of water and their impact on the global environment requires sensing information over the full volume of water. We develop a gradientbased dec...
Carrick Detweiler, Marek Doniec, Mingshun Jiang, M...
DAC
2009
ACM
13 years 7 months ago
A physical unclonable function defined using power distribution system equivalent resistance variations
For hardware security applications, the availability of secret keys is a critical component for secure activation, IC authentication and for other important applications including...
Ryan Helinski, Dhruva Acharyya, Jim Plusquellic
EUSFLAT
2009
175views Fuzzy Logic» more  EUSFLAT 2009»
13 years 7 months ago
Ant Colony Optimization for Distributed Routing Path Optimization in Optical Burst-Switched Networks
This work describes a distributed framework for routing path optimization in Optical Burst-Switched (OBS) networks that loosely mimics the foraging behaviour of ants observed in na...
João Pedro, João Pires, João ...
FPGA
2009
ACM
168views FPGA» more  FPGA 2009»
13 years 7 months ago
Large-scale wire-speed packet classification on FPGAs
Multi-field packet classification is a key enabling function of a variety of network applications, such as firewall processing, Quality of Service differentiation, traffic billing...
Weirong Jiang, Viktor K. Prasanna
ICPP
2009
IEEE
13 years 7 months ago
Using Coherence Information and Decay Techniques to Optimize L2 Cache Leakage in CMPs
This paper evaluates several techniques to save leakage in CMP L2 caches by selectively switching off the less used lines. We primarily focus on private snoopy L2 caches. In this c...
Matteo Monchiero, Ramon Canal, Antonio Gonzá...