Sciweavers

334 search results - page 4 / 67
» A System Design Methodology for Software Hardware Co-Develop...
Sort
View
ASPDAC
2008
ACM
164views Hardware» more  ASPDAC 2008»
13 years 8 months ago
The Shining embedded system design methodology based on self dynamic reconfigurable architectures
Complex design, targeting System-on-Chip based on reconfigurable architectures, still lacks a generalized methodology allowing both the automatic derivation of a complete system s...
Carlo Curino, Luca Fossati, Vincenzo Rana, Frances...
DATE
2006
IEEE
95views Hardware» more  DATE 2006»
13 years 10 months ago
Dynamic data type refinement methodology for systematic performance-energy design exploration of network applications
Network applications are becoming increasingly popular in the embedded systems domain requiring high performance, which leads to high energy consumption. In networks is observed t...
Alexandros Bartzas, Stylianos Mamagkakis, Georgios...
DATE
2004
IEEE
113views Hardware» more  DATE 2004»
13 years 10 months ago
Dynamic Memory Management Design Methodology for Reduced Memory Footprint in Multimedia and Wireless Network Applications
New portable consumer embedded devices must execute multimedia and wireless network applications that demand extensive memory footprint. Moreover, they must heavily rely on Dynami...
David Atienza, Stylianos Mamagkakis, Francky Catth...
MASCOTS
2007
13 years 7 months ago
PerfCenter: A Methodology and Tool for Performance Analysis of Application Hosting Centers
— We present a tool, PerfCenter, that takes as input the deployment, configuration, message flow and workload details of the hardware and software servers in an application hos...
Rukma Prabhu Verlekar, Varsha Apte, Prakhar Goyal,...
ASAP
2007
IEEE
134views Hardware» more  ASAP 2007»
13 years 8 months ago
Methodology and Toolset for ASIP Design and Development Targeting Cryptography-Based Applications
Network processors utilizing general-purpose instruction-set architectures (ISA) limit network throughput due to latency incurred from cryptography and hashing applications (AES, ...
David Montgomery, Ali Akoglu