Sciweavers

1631 search results - page 298 / 327
» Software engineering technology watch
Sort
View
TC
2010
13 years 4 months ago
Performance Comparison of Graphics Processors to Reconfigurable Logic: A Case Study
A systematic approach to the comparison of the graphics processor (GPU) and reconfigurable logic is defined in terms of three throughput drivers. The approach is applied to five ca...
Ben Cope, Peter Y. K. Cheung, Wayne Luk, Lee W. Ho...
TCAD
2010
105views more  TCAD 2010»
13 years 4 months ago
Fault Tolerant Network on Chip Switching With Graceful Performance Degradation
The structural redundancy inherent to on-chip interconnection networks [networks on chip (NoC)] can be exploited by adaptive routing algorithms in order to provide connectivity eve...
Adán Kohler, Gert Schley, Martin Radetzki
TE
2010
110views more  TE 2010»
13 years 4 months ago
A Wireless Communications Systems Laboratory Course
A novel wireless communications systems laboratory course is introduced. The course teaches students how to design, test, and simulate wireless systems using modern instrumentation...
Sabih Güzelgöz, Hüseyin Arslan
CHB
2011
183views more  CHB 2011»
13 years 1 months ago
Towards an ICT-based psychology: E-psychology
Cognitive science is the scientific domain which studies, analyses, simulates and infers for various aspects, functions and procedures of human mentality such as, thinking, logic, ...
Athanasios Drigas, Lefteris Koukianakis, Yannis Pa...
EUROSYS
2008
ACM
14 years 6 months ago
Eudaemon: involuntary and on-demand emulation against zero-day exploits
Eudaemon is a technique that aims to blur the borders between protected and unprotected applications, and brings together honeypot technology and end-user intrusion detection and ...
Georgios Portokalidis, Herbert Bos