Sciweavers

1025 search results - page 129 / 205
» Improved Behaviour of Tries by the
Sort
View
148
Voted
ASPDAC
1999
ACM
137views Hardware» more  ASPDAC 1999»
15 years 6 months ago
A Performance-Driven I/O Pin Routing Algorithm
This paper presents a performance-driven I/O pin routing algorithm with special consideration of wire uniformity. First, a topological routing based on min-cost max-flow algorith...
Dongsheng Wang, Ping Zhang, Chung-Kuan Cheng, Arun...
ICDCS
1999
IEEE
15 years 6 months ago
Design Considerations for Distributed Caching on the Internet
In this paper, we describe the design and implementation of an integrated architecture for cache systems that scale to hundreds or thousands of caches with thousands to millions o...
Renu Tewari, Michael Dahlin, Harrick M. Vin, Jonat...
95
Voted
ASIACRYPT
1999
Springer
15 years 6 months ago
Equivalent Keys of HPC
This paper presents a weakness in the key schedule of the AES candidate HPC (Hasty Pudding Cipher). It is shown that for the HPC version with a 128-bit key, 1 in 256 keys is weak i...
Carl D'Halluin, Gert Bijnens, Bart Preneel, Vincen...
ICSE
1998
IEEE-ACM
15 years 6 months ago
Overcoming the NAH Syndrome for Inspection Deployment
: Despite considerable evidence to show that inspections can help reduce costs and improve quality, inspections are not widely deployed in the software industry. One of the likely ...
Pankaj Jalote, M. Haragopal
DATE
1997
IEEE
89views Hardware» more  DATE 1997»
15 years 6 months ago
Cone-based clustering heuristic for list-scheduling algorithms
List scheduling algorithms attempt to minimize latency under resource constraints using a priority list. We propose a new heuristic that can be used in conjunction with any priori...
Sriram Govindarajan, Ranga Vemuri