Sciweavers

1042 search results - page 114 / 209
» Integrative Architecture Elicitation for Large Computer Base...
Sort
View
119
Voted
DSN
2007
IEEE
15 years 9 months ago
Using Register Lifetime Predictions to Protect Register Files against Soft Errors
— Device scaling and large integration increase the vulnerability of microprocessors to transient errors. One of the structures where errors can be most harmful is the register ...
Pablo Montesinos, Wei Liu, Josep Torrellas
114
Voted
IPPS
2000
IEEE
15 years 7 months ago
Three Dimensional VLSI-Scale Interconnects
As processor speeds rapidly approach the Giga-Hertz regime, the disparity between process time and memory access time plays an increasing role in the overall limitation of processo...
Dennis W. Prather
ICDAR
2009
IEEE
15 years 10 months ago
Text Detection and Localization in Complex Scene Images using Constrained AdaBoost Algorithm
We have proposed a complete system for text detection and localization in gray scale scene images. A boosting framework integrating feature and weak classifier selection based on...
Shehzad Muhammad Hanif, Lionel Prevost
EUROPAR
2003
Springer
15 years 8 months ago
On Transmission Scheduling in a Server-Less Video-on-Demand System
Recently, a server-less video-on-demand architecture has been proposed which can completely eliminate costly dedicated video servers and yet is highly scalable and reliable. Due to...
C. Y. Chan, Jack Y. B. Lee
131
Voted
ARC
2009
Springer
165views Hardware» more  ARC 2009»
15 years 10 months ago
Optimizing the Control Hierarchy of an ECC Coprocessor Design on an FPGA Based SoC Platform
Abstract. Most hardware/software codesigns of Elliptic Curve Cryptography only have one central control unit, typically a 32 bit or 8 bit processor core. With the ability of integr...
Xu Guo, Patrick Schaumont