Sciweavers

482 search results - page 60 / 97
» A bitmask-based code compression technique for embedded syst...
Sort
View
113
Voted
CODES
2008
IEEE
15 years 19 days ago
Methodology for multi-granularity embedded processor power model generation for an ESL design flow
With power becoming a major constraint for multi-processor embedded systems, it is becoming important for designers to characterize and model processor power dissipation. It is cr...
Young-Hwan Park, Sudeep Pasricha, Fadi J. Kurdahi,...
117
Voted
IEEECIT
2010
IEEE
14 years 11 months ago
Superblock-Based Source Code Optimizations for WCET Reduction
—Superblocks represent regions in a program code that consist of multiple basic blocks. Compilers benefit from this structure since it enables optimization across block boundari...
Paul Lokuciejewski, Timon Kelter, Peter Marwedel
144
Voted
IPPS
2006
IEEE
15 years 6 months ago
MPEG-2 decoding in a stream programming language
Image and video codecs are prevalent in multimedia devices, ranging from embedded systems, to desktop computers, to high-end servers such as HDTV editing consoles. It is not uncom...
M. Drake, Henry Hoffmann, Rodric M. Rabbah, Saman ...
CODES
2008
IEEE
15 years 7 months ago
Static analysis of processor stall cycle aggregation
Processor Idle Cycle Aggregation (PICA) is a promising approach for low power execution of processors, in which small memory stalls are aggregated to create a large one, and the p...
Jongeun Lee, Aviral Shrivastava
TCSV
2008
156views more  TCSV 2008»
15 years 12 days ago
Robust Lossless Image Data Hiding Designed for Semi-Fragile Image Authentication
Recently, among various data hiding techniques, a new subset, lossless data hiding, has received increasing interest. Most of the existing lossless data hiding algorithms are, howe...
Zhicheng Ni, Yun Q. Shi, Nirwan Ansari, Wei Su, Qi...