Sciweavers

43264 search results - page 8162 / 8653
» Comparing models of computation
Sort
View
RTCSA
2005
IEEE
15 years 9 months ago
FPGA-Based Content Protection System for Embedded Consumer Electronics
We propose a new architecture for a content protection system that conceals confidential data and algorithms in an FPGA as electrical circuits. This architecture is designed for a...
Hiroyuki Yokoyama, Kenji Toda
SKG
2005
IEEE
15 years 9 months ago
Building Sensor Filter Grids: Information Architecture for the Data Deluge
—We discuss a general architectural approach to knowledge and information management and delivery in distributed systems. Our approach is based on the recognition that time-stamp...
Geoffrey Fox, Mehmet S. Aktas, Galip Aydin, Andrea...
TRIDENTCOM
2005
IEEE
15 years 9 months ago
Integrated Network Experimentation using Simulation and Emulation
Discrete-event packet-level network simulation is well-known and widely used. Network emulation is a hybrid approach that combines real elements of a deployed networked applicatio...
Shashi Guruprasad, Robert Ricci, Jay Lepreau
VISUALIZATION
2005
IEEE
15 years 9 months ago
Opening the Black Box - Data Driven Visualization of Neural Network
Arti cial neural networks are computer software or hardware models inspired by the structure and behavior of neurons in the human nervous system. As a powerful learning tool, incr...
Fan-Yin Tzeng, Kwan-Liu Ma
VLSID
2005
IEEE
120views VLSI» more  VLSID 2005»
15 years 9 months ago
On Finding Consecutive Test Vectors in a Random Sequence for Energy-Aware BIST Design
During pseudorandom testing, a significant amount of energy and test application time is wasted for generating and for applying “useless” test vectors that do not contribute t...
Sheng Zhang, Sharad C. Seth, Bhargab B. Bhattachar...
« Prev « First page 8162 / 8653 Last » Next »