Sciweavers

2945 search results - page 19 / 589
» Designing and Implementing Malicious Hardware
Sort
View
ISAAC
2007
Springer
109views Algorithms» more  ISAAC 2007»
15 years 5 months ago
Manipulation in Games
This paper studies to which extent the social welfare of a game can be influenced by an interested third party within economic reason, i.e., by taking the implementation cost into...
Raphael Eidenbenz, Yvonne Anne Oswald, Stefan Schm...
ASPDAC
2009
ACM
105views Hardware» more  ASPDAC 2009»
15 years 4 months ago
Design and chip implementation of the ubiquitous processor HCgorilla
Masa-Aki Fukase, Kazunori Noda, Atsuko Yokoyama, T...
ICCD
2005
IEEE
224views Hardware» more  ICCD 2005»
15 years 8 months ago
Algorithmic and Architectural Design Methodology for Particle Filters in Hardware
In this paper we present algorithmic and architectural methodology for building Particle Filters in hardware. Particle filtering is a new paradigm for filtering in presence of n...
Aswin C. Sankaranarayanan, Rama Chellappa, Ankur S...
DCC
2008
IEEE
15 years 1 months ago
Design and Implementation of a High-Performance Microprocessor Cache Compression Algorithm
Researchers have proposed using hardware data compression units within the memory hierarchies of microprocessors in order to improve performance, energy efficiency, and functional...
Xi Chen, Lei Yang, Haris Lekatsas, Robert P. Dick,...