Sciweavers

188 search results - page 25 / 38
» Developing a Hardware Evaluation Method for SHA-3 Candidates
Sort
View
FPL
2008
Springer
111views Hardware» more  FPL 2008»
15 years 1 months ago
Sampling from the exponential distribution using independent Bernoulli variates
The exponential distribution is a key distribution in many event-driven Monte-Carlo simulations, where it is used to model the time between random events in the system. This paper...
David B. Thomas, Wayne Luk
ASPLOS
2008
ACM
15 years 1 months ago
Streamware: programming general-purpose multicore processors using streams
Recently, the number of cores on general-purpose processors has been increasing rapidly. Using conventional programming models, it is challenging to effectively exploit these core...
Jayanth Gummaraju, Joel Coburn, Yoshio Turner, Men...
EUC
2008
Springer
15 years 1 months ago
A Lightweight Detection and Recovery Infrastructure of Kernel Objects for Embedded Systems
The kernel objects consist of critical kernel data structures and system call functions, which are the most important data for a system, should be protected as first-class candida...
Lei Sun, Tatsuo Nakajima
ICST
2009
IEEE
15 years 6 months ago
On the Effectiveness of Test Extraction without Overhead
Developers write and execute ad-hoc tests as they implement software. While these tests reflect important insights of the developers (e.g., which parts of the software need testi...
Andreas Leitner, Alexander Pretschner, Stefan Mori...
FPGA
2006
ACM
224views FPGA» more  FPGA 2006»
15 years 3 months ago
Flexible implementation of genetic algorithms on FPGAs
In this paper, we propose a technique to flexibly implement genetic algorithms for various problems on FPGAs. For the purpose, we propose a basic architecture for GA which consist...
Tatsuhiro Tachibana, Yoshihiro Murata, Naoki Shiba...