Sciweavers

3898 search results - page 251 / 780
» On the Bit Extraction Problem
Sort
View
TVLSI
2002
94views more  TVLSI 2002»
15 years 3 months ago
A network flow approach to memory bandwidth utilization in embedded DSP core processors
This paper presents a network flow approach to solving the register binding and allocation problem for multiword memory access DSP processors. In recently announced DSP processors,...
Catherine H. Gebotys
168
Voted
JSAC
2008
141views more  JSAC 2008»
15 years 2 months ago
On cooperative source transmission with partial rate and power control
The problem of transmitting a Gaussian source over a half-duplex fading relay channel with limited channel state feedback is studied. It is shown that under a short-term power cons...
Thanh Tùng Kim, Mikael Skoglund, Giuseppe C...
142
Voted
SIGMOD
2008
ACM
98views Database» more  SIGMOD 2008»
15 years 2 months ago
Scaleability and immortality
James Nicholas Gray's understanding and experimentation gave him a special perspective. From 1995 his commitment was building indefinitely scalable tools by working on really...
Gordon Bell
AINA
2010
IEEE
15 years 2 months ago
Compensation of Sensors Nonlinearity with Neural Networks
—This paper describes a method of linearizing the nonlinear characteristics of many sensors using an embedded neural network. The proposed method allows for complex neural networ...
Nicholas J. Cotton, Bogdan M. Wilamowski
PQCRYPTO
2010
176views Cryptology» more  PQCRYPTO 2010»
15 years 1 months ago
Practical Power Analysis Attacks on Software Implementations of McEliece
The McEliece public-key cryptosystem is based on the fact that decoding unknown linear binary codes is an NP-complete problem. The interest on implementing post-quantum cryptograph...
Stefan Heyse, Amir Moradi, Christof Paar