Sciweavers

234 search results - page 35 / 47
» Towards a decentralized architecture for optimization
Sort
View
FCCM
2004
IEEE
133views VLSI» more  FCCM 2004»
14 years 5 days ago
A Methodology for Synthesis of Efficient Intrusion Detection Systems on FPGAs
Intrusion detection for network security is a computation intensive application demanding high system performance. System level design, a relatively unexplored field in this area,...
Zachary K. Baker, Viktor K. Prasanna
CF
2005
ACM
13 years 10 months ago
On the energy-efficiency of speculative hardware
Microprocessor trends are moving towards wider architectures and more aggressive speculation. With the increasing transistor budgets, energy consumption has become a critical desi...
Nana B. Sam, Martin Burtscher
AINA
2008
IEEE
14 years 2 months ago
Performance Analysis of Data Delivery Schemes for a Multi-Sink Wireless Sensor Network
Wireless sensor networks are expected to be deployed in harsh environments characterised by extremely poor and fluctuating channel conditions. With the commonly adopted single-si...
Hwee Pink Tan, Adriana Felicia Gabor, Winston Khoo...
ICDE
2003
IEEE
102views Database» more  ICDE 2003»
14 years 9 months ago
Schema Mediation in Peer Data Management Systems
Intuitively, data management and data integration tools should be well-suited for exchanging information in a semantically meaningful way. Unfortunately, they suffer from two sign...
Alon Y. Halevy, Zachary G. Ives, Dan Suciu, Igor T...
PARA
2004
Springer
14 years 1 months ago
Automatic Derivation of Linear Algebra Algorithms with Application to Control Theory
It is our belief that the ultimate automatic system for deriving linear algebra libraries should be able to generate a set of algorithms starting from the mathematical specificati...
Paolo Bientinesi, Sergey Kolos, Robert A. van de G...