Sciweavers

4781 search results - page 871 / 957
» Online algorithms for network design
Sort
View
MM
2004
ACM
109views Multimedia» more  MM 2004»
15 years 6 months ago
Loss-resilient on-demand media streaming using priority encoding
A novel solution to the reliable multicast problem is the “digital fountain” approach, in which data is encoded with an erasure protection code before transmission, and receiv...
Cheng Huang, Ramaprabhu Janakiraman, Lihao Xu
ISCAS
2003
IEEE
114views Hardware» more  ISCAS 2003»
15 years 6 months ago
On the hardware implementations of the SHA-2 (256, 384, 512) hash functions
Couple to the communications wired and unwired networks growth, is the increasing demand for strong secure data transmission. New cryptographic standards are developed, and new en...
Nicolas Sklavos, Odysseas G. Koufopavlou
DAC
2003
ACM
15 years 6 months ago
Test application time and volume compression through seed overlapping
We propose in this paper an extension on the Scan Chain Concealment technique to further reduce test time and volume requirement. The proposed methodology stems from the architect...
Wenjing Rao, Ismet Bayraktaroglu, Alex Orailoglu
ICANN
2003
Springer
15 years 6 months ago
Expectation-MiniMax Approach to Clustering Analysis
Abstract. This paper proposes a general approach named ExpectationMiniMax (EMM) for clustering analysis without knowing the cluster number. It describes the contrast function of Ex...
Yiu-ming Cheung
ASPDAC
2009
ACM
159views Hardware» more  ASPDAC 2009»
15 years 6 months ago
Congestion-aware power grid optimization for 3D circuits using MIM and CMOS decoupling capacitors
— In three-dimensional (3D) chips, the amount of supply current per package pin is significantly more than in two-dimensional (2D) designs. Therefore, the power supply noise pro...
Pingqiang Zhou, Karthikk Sridharan, Sachin S. Sapa...