Sciweavers

1045 search results - page 129 / 209
» Improving SHA-2 Hardware Implementations
Sort
View
ICCAD
2002
IEEE
89views Hardware» more  ICCAD 2002»
14 years 20 days ago
Free space management for cut-based placement
IP blocks and large macro cells are increasingly prevalent in physical design, actually causing an increase in the available free space for the dust logic. We observe that top-dow...
Charles J. Alpert, Gi-Joon Nam, Paul Villarrubia
IPPS
2000
IEEE
14 years 3 days ago
De Bruijn Isomorphisms and Free Space Optical Networks
The de Bruijn digraph Bd;D is usually defined by words of size D on an alphabet of cardinality d, through a cyclic left shift permutation on the words, after which the rightmos...
David Coudert, Afonso Ferreira, Stephane Perennes
RT
1999
Springer
13 years 12 months ago
Interactive Rendering with Arbitrary BRDFs using Separable Approximations
A separable decomposition of bidirectional reflectance distributions (BRDFs) is used to implement arbitrary reflectances from point sources on existing graphics hardware. Two-dim...
Jan Kautz, Michael D. McCool
APCSAC
2004
IEEE
13 years 11 months ago
Continuous Adaptive Object-Code Re-optimization Framework
Dynamic optimization presents opportunities for finding run-time bottlenecks and deploying optimizations in statically compiled programs. In this paper, we discuss our current impl...
Howard Chen, Jiwei Lu, Wei-Chung Hsu, Pen-Chung Ye...
ESANN
2008
13 years 9 months ago
Pruning and Regularisation in Reservoir Computing: a First Insight
Reservoir Computing is a new paradigm for using Recurrent Neural Networks which shows promising results. However, as the recurrent part is created randomly, it typically needs to b...
Xavier Dutoit, Benjamin Schrauwen, Jan M. Van Camp...