Sciweavers

9316 search results - page 105 / 1864
» Analysis of traceback techniques
Sort
View
121
Voted
ISVLSI
2006
IEEE
114views VLSI» more  ISVLSI 2006»
15 years 9 months ago
A Low Power Lookup Technique for Multi-Hashing Network Applications
Many network security applications require large virus signature sets to be maintained, retrieved, and compared against the network streams. Software applications frequently fail ...
Ilhan Kaya, Taskin Koçak
124
Voted
GECCO
2008
Springer
161views Optimization» more  GECCO 2008»
15 years 4 months ago
An evolutionary design technique for collective communications on optimal diameter-degree networks
Scheduling collective communications (CC) in networks based on optimal graphs and digraphs has been done with the use of the evolutionary techniques. Inter-node communication patt...
Jirí Jaros, Vaclav Dvorak
137
Voted
TCAD
1998
119views more  TCAD 1998»
15 years 3 months ago
A controller redesign technique to enhance testability of controller-data path circuits
—We study the effect of the controller on the testability of sequential circuits composed of controllers and data paths. We show that even when all the loops of the circuit have ...
Sujit Dey, Vijay Gangaram, Miodrag Potkonjak
168
Voted
PAMI
2011
14 years 10 months ago
Revisiting Linear Discriminant Techniques in Gender Recognition
—Emerging applications of computer vision and pattern recognition in mobile devices and networked computing require the development of resourcelimited algorithms. Linear classifi...
Juan Bekios-Calfa, José Miguel Buenaposada,...
108
Voted
DAC
1999
ACM
16 years 4 months ago
Behavioral Synthesis Techniques for Intellectual Property Protection
? The economic viability of the reusable core-based design paradigm depends on the development of techniques for intellectual property protection. We introduce the first dynamic wa...
Inki Hong, Miodrag Potkonjak