: This paper describes the development of an Intellectual Property (IP) core in VHDL able to implement a Multilayer Perceptron (MLP) artificial neural network (ANN) topology with u...
Abstract. One of the most frequent operations in modern cryptosystems is a multi-scalar multiplication with two scalars. Common methods to compute it are the Shamir method and the ...
: The availability of applications able to exploit multi-device environments is steadily increasing. Rather than using all devices in the same way, users tend to assign different r...
Advances in mobile devices and wireless telecommunication infrastructure already provide mobile users with access to online information sources and services. Compared to the PC-wo...
Initial results have been achieved for automatic synthesis of MEMS system-level lumped parameter models using genetic programming and bond graphs. This paper first discusses the ne...
Zhun Fan, Kisung Seo, Jianjun Hu, Ronald C. Rosenb...