Sciweavers

6960 search results - page 1240 / 1392
» Continuity Analysis of Programs
Sort
View
ICCAD
2006
IEEE
180views Hardware» more  ICCAD 2006»
16 years 6 days ago
A bitmask-based code compression technique for embedded systems
Embedded systems are constrained by the available memory. Code compression techniques address this issue by reducing the code size of application programs. Dictionary-based code c...
Seok-Won Seong, Prabhat Mishra
117
Voted
ICCAD
2004
IEEE
155views Hardware» more  ICCAD 2004»
16 years 6 days ago
Robust analog/RF circuit design with projection-based posynomial modeling
In this paper we propose a RObust Analog Design tool (ROAD) for post-tuning analog/RF circuits. Starting from an initial design derived from hand analysis or analog circuit synthe...
Xin Li, Padmini Gopalakrishnan, Yang Xu, Lawrence ...
FPGA
2010
ACM
243views FPGA» more  FPGA 2010»
16 years 5 days ago
Bit-level optimization for high-level synthesis and FPGA-based acceleration
d hardware design from behavior-level abstraction has drawn wide interest in FPGA-based acceleration and configurable computing research field. However, for many high-level progra...
Jiyu Zhang, Zhiru Zhang, Sheng Zhou, Mingxing Tan,...
120
Voted
CVPR
2010
IEEE
15 years 10 months ago
Interest Seam Image
We propose interest seam image, an efficient visual synopsis for video. To extract an interest seam image, a spatiotemporal energy map is constructed for the target video shot. T...
Xiao Zhang, Gang Hua, Lei Zhang, Heung-Yeung Shum
EDBTW
2010
Springer
15 years 10 months ago
Toward a software development methodology for anonymity applications
There are some software applications especially in privacy protection domain which they need anonymity support. Therefore lots of methods and protocols have been presented so far ...
Marzieh Ispareh, Behrouz Tork Ladani, Shirin Shari...
« Prev « First page 1240 / 1392 Last » Next »