In this paper, a hardware implementation of the AES128 encryption algorithm is proposed. A unique feature of the proposed pipelined design is that the round keys, which are consum...
ABSTRACT: We present a Built-In Self-Test (BIST) approach for programmable embedded memories in Xilinx Virtex-4 Field Programmable Gate Arrays (FPGAs). The target resources are the...
Brooks R. Garrison, Daniel T. Milton, Charles E. S...
Highly varying job demands generally consist of many short jobs mixed with several long jobs. In this paper, we consider a simple scenario where two job streams with different lev...
Feng Zhang, Lester Lipsky, Sarah Tasneem, Steve Th...
The nearest shrunken centroid classifier uses shrunken centroids as prototypes for each class and test samples are classified to belong to the class whose shrunken centroid is nea...
As computing technologies continue to rapidly advance since the last two decades, the knowledge economy has become an important part of the overall world economy. In addition to i...
Frederick Harris, Gordon K. Lee, Stuart Harvey Rub...
The invention of the Internet has ushered in advances in information era which has revolutionized the way we conduct business, advances our knowledge and promote life long learning...
Sarah Tasneem, Reda A. Ammar, Lester Lipsky, Howar...
The large unstructured text collections demand full-text search capabilities from IR systems. Current systems typically allow users only to connect to a single database (or site) ...
Ideally computer pattern recognition systems should be insensitive to scaling, translation, distortion and rotation. Many neural network models have been proposed to address this ...
We investigate a method to speed up the O(n3 ) labeling algorithm of Rosenfeld and Pfaltz for segmenting binary images, which is unduly complex for large images. That algorithm sea...