Sciweavers

CSREAESA
2004
13 years 6 months ago
Approaches for Monitoring Vectors on Microprocessor Buses
This paper introduces two new methods for observing and recording the vectors that have been asserted on a bus. The first is a software approach that uses a novel data structure s...
Hector Arteaga, Hussain Al-Asaad
CSREAESA
2004
13 years 6 months ago
Driving Fully-Adiabatic Logic Circuits Using Custom High-Q MEMS Resonators
To perform digital logic in CMOS in a truly adiabatic (asymptotically thermodynamically reversible) fashion requires that logic transitions be driven by a quasitrapezoidal (flat-t...
Venkiteswaran Anantharam, Maojiao He, Krishna Nata...
CSREAESA
2004
13 years 6 months ago
A Low-Power Pipelined Implementation of 2D Discrete Wavelet Transform
Discrete wavelet transform has been incorporated as part of the JPEG2000 image compression standard and is being deployed in various portable consumer products. This raises the in...
Yong Liu, Edmund Ming-Kit Lai, A. Benjamin Premkum...
CSREAESA
2004
13 years 6 months ago
A High Performance, Low Area Overhead Carry Lookahead Adder
Adders are some of the most critical data path circuits requiring considerable design effort in order to "squeeze" out as much performance gain as possible. Many adder d...
James Levy, Jabulani Nyathi
CSREAESA
2007
13 years 6 months ago
Embedded Intelligence
Irvin Jones
CSREAESA
2007
13 years 6 months ago
The Effect of Nanometer-Scale Technologies on the Cache Size Selection for Low Energy Embedded Systems
- Several studies have shown that cache memories account for more than 40% of the total energy consumed in processor-based embedded systems. In microscale technology nodes, active ...
Hamid Noori, Maziar Goudarzi, Koji Inoue, Kazuaki ...
CSREAESA
2007
13 years 6 months ago
A VoIP Softphone on a Bare PC
- We describe the architecture, design, and implementation of a VoIP softphone that runs on a bare Intel-386 (or above) based PC. We compare the performance of bare PC and WinRTP s...
Gholam H. Khaksari, Alexander L. Wijesinha, Ramesh...
CSREAESA
2007
13 years 6 months ago
IT Security Protection at Field Level of Industrial Automation Systems
—Current industrial automation systems are virtually unprotected against attacks on IT security at field level, especially if an attacker is able to connect physically to field...
Felix Gutbrodt