Sciweavers

1986 search results - page 226 / 398
» constraints 2006
Sort
View
ISCAS
2006
IEEE
119views Hardware» more  ISCAS 2006»
14 years 2 months ago
Scheduling and binding for low gate leakage nanoCMOS datapath circuit synthesis
In this paper we present two polynomial time-complexity heuristic algorithms for optimization of gate-oxide leakage (tunneling current) during behavioral synthesis through simulta...
Saraju P. Mohanty, Elias Kougianos, Ramakrishna Ve...
ISCAS
2006
IEEE
163views Hardware» more  ISCAS 2006»
14 years 2 months ago
ASIC hardware implementation of the IDEA NXT encryption algorithm
— Symmetric-key block ciphers are often used to provide data confidentiality with low complexity, especially in the case of dedicated hardware implementations. IDEA NXT is a nov...
Marco Macchetti, Wenyu Chen
ISCC
2006
IEEE
14 years 2 months ago
Analysis of Resource Increase and Decrease Algorithm in Wireless Sensor Networks
In this paper, we first attempt to formally define the resource control framework that adjusts the resource provisioning at the hotspot during congestion. In an effort to find ...
JaeWon Kang, Yanyong Zhang, Badri Nath
KBSE
2006
IEEE
14 years 2 months ago
Modularity Analysis of Logical Design Models
Traditional design representations are inadequate for generalized reasoning about modularity in design and its technical and economic implications. We have developed an architectu...
Yuanfang Cai, Kevin J. Sullivan
MMM
2006
Springer
139views Multimedia» more  MMM 2006»
14 years 2 months ago
An attention based spatial adaptation scheme for H.264 videos on mobiles
When browsing videos in mobile devices, people often feel that resolution greatly affects their perceptual experience in the limited screen size. In this paper, an attention based...
Yi Wang, Xin Fan, Houqiang Li, Zhengkai Liu, Mingj...