Sciweavers

MICRO
2010
IEEE
145views Hardware» more  MICRO 2010»
13 years 2 months ago
Combating Aging with the Colt Duty Cycle Equalizer
Bias temperature instability, hot-carrier injection, and gate-oxide wearout will cause severe lifetime degradation in the performance and the reliability of future CMOS devices. Th...
Erika Gunadi, Abhishek A. Sinkar, Nam Sung Kim, Mi...
USITS
2001
13 years 5 months ago
CANS: Composable, Adaptive Network Services Infrastructure
Ubiquitous access to sophisticated internet services from diverse end devices across heterogeneous networks requires the injection of additional functionality into the network to ...
Xiaodong Fu, Weisong Shi, Anatoly Akkerman, Vijay ...
USENIX
2008
13 years 6 months ago
A Linux Implementation Validation of Track-Aligned Extents and Track-Aligned RAIDs
Through clean-slate implementation of two storage optimizations--track-aligned extents and track-aligned RAIDs--this paper shows the values of independent validations. The experie...
Jin Qian, Christopher R. Meyers, An-I Andy Wang
ICCAD
1994
IEEE
74views Hardware» more  ICCAD 1994»
13 years 8 months ago
Non-scan design-for-testability of RT-level data paths
- This paper presents a non-scan design-for-testability technique applicable to register-transfer(RT) level data path circuits, which are usually very hard-to-test due to the prese...
Sujit Dey, Miodrag Potkonjak
DATE
1998
IEEE
110views Hardware» more  DATE 1998»
13 years 8 months ago
Scheduling and Module Assignment for Reducing Bist Resources
Built-in self-test BIST techniques modify functional hardware to give a data path the capability to test itself. The modi cation of data path registers into registers BIST resourc...
Ishwar Parulkar, Sandeep K. Gupta, Melvin A. Breue...
FPGA
2004
ACM
121views FPGA» more  FPGA 2004»
13 years 10 months ago
Divide and concatenate: a scalable hardware architecture for universal MAC
We present a cryptographic architecture optimization technique called divide-and-concatenate based on two observations: (i) the area of a multiplier and associated data path decre...
Bo Yang, Ramesh Karri, David A. McGrew
CLEANDB
2006
ACM
163views Database» more  CLEANDB 2006»
13 years 10 months ago
Circumventing Data Quality Problems Using Multiple Join Paths
We propose the Multiple Join Path (MJP) framework for obtaining high quality information by linking fields across multiple databases, when the underlying databases have poor qual...
Yannis Kotidis, Amélie Marian, Divesh Sriva...
IESS
2007
Springer
156views Hardware» more  IESS 2007»
13 years 10 months ago
Automatic Data Path Generation from C code for Custom Processors
The stringent performance constraints and short time to market of modern digital systems require automatic methods for design of high performance applicationspecific architectures...
Jelena Trajkovic, Daniel Gajski
INFOCOM
2009
IEEE
13 years 11 months ago
Delivery Properties of Human Social Networks
—The recently proposed Pocket Switched Network paradigm takes advantage of human social contacts to opportunistically create data paths over time. We examine how effective such a...
Nishanth Sastry, Karen R. Sollins, Jon Crowcroft
EUROSYS
2008
ACM
14 years 1 months ago
Protectit: trusted distributed services operating on sensitive data
Protecting shared sensitive information is a key requirement for today’s distributed applications. Our research uses virtualization technologies to create and maintain trusted d...
Jiantao Kong, Karsten Schwan, Min Lee, Mustaque Ah...