Sciweavers

4166 search results - page 751 / 834
» A modular module system
Sort
View
FPGA
2007
ACM
124views FPGA» more  FPGA 2007»
15 years 8 months ago
Efficient hardware checkpointing: concepts, overhead analysis, and implementation
Progress in reconfigurable hardware technology allows the implementation of complete SoCs in today's FPGAs. In the context design for reliability, software checkpointing is a...
Dirk Koch, Christian Haubelt, Jürgen Teich
ICC
2007
IEEE
114views Communications» more  ICC 2007»
15 years 8 months ago
Channel-Matched Spreading Codes for the Downlink of MC-CDMA
Abstract-- This paper concerns the multiple access performance of spreading codes used in the downlink of multicarrier code-division multiple-access (MC-CDMA). Complex-valued sprea...
Qinghua Shi, Yong Liang Guan, Choi Look Law
DATE
2010
IEEE
130views Hardware» more  DATE 2010»
15 years 8 months ago
Supporting Distributed Shared Memory on multi-core Network-on-Chips using a dual microcoded controller
Abstract—Supporting Distributed Shared Memory (DSM) is essential for multi-core Network-on-Chips for the sake of reusing huge amount of legacy code and easy programmability. We p...
Xiaowen Chen, Zhonghai Lu, Axel Jantsch, Shuming C...
DATE
2004
IEEE
97views Hardware» more  DATE 2004»
15 years 8 months ago
A Formal Verification Methodology for Checking Data Integrity
Formal verification techniques have been playing an important role in pre-silicon validation processes. One of the most important points considered in performing formal verificati...
Yasushi Umezawa, Takeshi Shimizu
CISC
2006
Springer
131views Cryptology» more  CISC 2006»
15 years 8 months ago
Efficient Intrusion-Resilient Signatures Without Random Oracles
Intrusion-resilient signatures are key-evolving protocols that extend the concepts of forward-secure and key-insulated signatures. As in the latter schemes, time is divided into di...
Benoît Libert, Jean-Jacques Quisquater, Moti...