Sciweavers

1045 search results - page 90 / 209
» Improving SHA-2 Hardware Implementations
Sort
View
ICCAD
2004
IEEE
134views Hardware» more  ICCAD 2004»
14 years 6 months ago
Engineering details of a stable force-directed placer
Ana/ytic placement methods that simultaneously minimize wire length and spread cells are receiving renewedattention from both academia and industiy In thispaper we describe the im...
Kristofer Vorwerk, Andrew A. Kennings, Anthony Van...
ICCAD
2003
IEEE
159views Hardware» more  ICCAD 2003»
14 years 6 months ago
Array Composition and Decomposition for Optimizing Embedded Applications
Optimizing array accesses is extremely critical in embedded computing as many embedded applications make use of arrays (in form of images, video frames, etc). Previous research co...
Guilin Chen, Mahmut T. Kandemir, A. Nadgir, Ugur S...
ECBS
2009
IEEE
89views Hardware» more  ECBS 2009»
14 years 4 months ago
Optimisation Process for Maintaining Evolvability during Software Evolution
Software systems have to be changed continuously and evolutionarily throughout the whole time of their development and usage. Meanwhile, the software systems have to remain flexi...
Robert Brcina, Stephan Bode, Matthias Riebisch
TEI
2009
ACM
141views Hardware» more  TEI 2009»
14 years 4 months ago
Kurio: a museum guide for families
We discuss three design strategies for improving the quality of social interaction and learning with interactive museum guides: 1) embodied interaction; 2) game-learning; 3) a hyb...
Ron Wakkary, Marek Hatala, Kevin Muise, Karen Tane...
DATE
2009
IEEE
136views Hardware» more  DATE 2009»
14 years 4 months ago
A file-system-aware FTL design for flash-memory storage systems
Abstract—As flash memory became popular over various platforms, there is a strong demand on the performance degradation problem, due to the special characteristics of flash mem...
Po-Liang Wu, Yuan-Hao Chang, Tei-Wei Kuo