Sciweavers

1560 search results - page 182 / 312
» Order Functions and Evaluation Codes
Sort
View
FPL
2010
Springer
129views Hardware» more  FPL 2010»
13 years 8 months ago
FPGA Implementations of the Round Two SHA-3 Candidates
Abstract--The second round of the NIST-run public competition is underway to find a new hash algorithm(s) for inclusion in the NIST Secure Hash Standard (SHA-3). This paper present...
Brian Baldwin, Andrew Byrne, Liang Lu, Mark Hamilt...
WWW
2010
ACM
14 years 5 months ago
Empirical comparison of algorithms for network community detection
Detecting clusters or communities in large real-world graphs such as large social or information networks is a problem of considerable interest. In practice, one typically chooses...
Jure Leskovec, Kevin J. Lang, Michael W. Mahoney
SIGMETRICS
2006
ACM
106views Hardware» more  SIGMETRICS 2006»
14 years 4 months ago
Automatic logging of operating system effects to guide application-level architecture simulation
Modern architecture research relies heavily on applicationlevel detailed pipeline simulation. A time consuming part of building a simulator is correctly emulating the operating sy...
Satish Narayanasamy, Cristiano Pereira, Harish Pat...
CODES
2009
IEEE
14 years 3 months ago
Native MPSoC co-simulation environment for software performance estimation
Performance estimation of Multi-Processor System-On-Chip (MPa high abstraction level is required in order to perform early architecture exploration and accurate design validations...
Patrice Gerin, Mian Muhammad Hamayun, Fréd&...
PROFES
2005
Springer
14 years 3 months ago
Using the MOWAHS Characterisation Framework for Development of Mobile Work Applications
This paper describes an evaluation of a characterisation framework to analyse mobile work scenarios in order to make corresponding software systems. The framework identifies comple...
Alf Inge Wang, Carl-Fredrik Sørensen, Heri ...