Sciweavers

2034 search results - page 333 / 407
» On the Comparability of Software Clustering Algorithms
Sort
View
CASES
2007
ACM
13 years 12 months ago
Cache leakage control mechanism for hard real-time systems
Leakage energy consumption is an increasingly important issue as the technology continues to shrink. Since on-chip caches constitute a major portion of the processor's transi...
Jaw-Wei Chi, Chia-Lin Yang, Yi-Jung Chen, Jian-Jia...
EMSOFT
2008
Springer
13 years 9 months ago
Energy efficient streaming applications with guaranteed throughput on MPSoCs
In this paper we present a design space exploration flow to achieve energy efficiency for streaming applications on MPSoCs while meeting the specified throughput constraints. The ...
Jun Zhu, Ingo Sander, Axel Jantsch
AVI
2004
13 years 9 months ago
CircleView: a new approach for visualizing time-related multidimensional data sets
This paper introduces a new approach for visualizing multidimensional time-referenced data sets, called Circle View. The Circle View technique is a combination of hierarchical vis...
Daniel A. Keim, Jörn Schneidewind, Mike Sips
CHES
2010
Springer
159views Cryptology» more  CHES 2010»
13 years 9 months ago
Provably Secure Higher-Order Masking of AES
Implementations of cryptographic algorithms are vulnerable to Side Channel Analysis (SCA). To counteract it, masking schemes are usually involved which randomize key-dependent data...
Matthieu Rivain, Emmanuel Prouff
AROBOTS
2011
13 years 3 months ago
Large scale graph-based SLAM using aerial images as prior information
— To effectively navigate in their environments and accurately reach their target locations, mobile robots require a globally consistent map of the environment. The problem of le...
Rainer Kümmerle, Bastian Steder, Christian Do...