Sciweavers

1040 search results - page 110 / 208
» Resource Usage Verification
Sort
View
WOWMOM
2006
ACM
151views Multimedia» more  WOWMOM 2006»
15 years 9 months ago
Network Coding for Wireless Mesh Networks: A Case Study
Network coding is a new transmission paradigm that proved its strength in optimizing the usage of network resources. In this paper, we evaluate the gain from using network coding ...
Anwar Al Hamra, Chadi Barakat, Thierry Turletti
DATE
2005
IEEE
168views Hardware» more  DATE 2005»
15 years 9 months ago
Hardware Acceleration of Hidden Markov Model Decoding for Person Detection
This paper explores methods for hardware acceleration of Hidden Markov Model (HMM) decoding for the detection of persons in still images. Our architecture exploits the inherent st...
Suhaib A. Fahmy, Peter Y. K. Cheung, Wayne Luk
ESCIENCE
2005
IEEE
15 years 9 months ago
The Challenge of Volunteer Computing with Lengthy Climate Model Simulations
This paper describes the issues confronted by the climateprediction.net project in creating a volunteer computing project using a large legacy climate model application. This appl...
Carl Christensen, Tolu Aina, Dave Stainforth
FPT
2005
IEEE
98views Hardware» more  FPT 2005»
15 years 9 months ago
Secure Partial Reconfiguration of FPGAs
SRAM FPGAs are vulnerable to security breaches such as bitstream cloning, reverse-engineering, and tampering. Bitstream encryption and authentication are two most effective and pr...
Amir Sheikh Zeineddini, Kris Gaj
GLVLSI
2005
IEEE
118views VLSI» more  GLVLSI 2005»
15 years 9 months ago
A continuous time markov decision process based on-chip buffer allocation methodology
We have presented an optimal on-chip buffer allocation and buffer insertion methodology which uses stochastic models of the architecture. This methodology uses finite buffer s...
Sankalp Kallakuri, Nattawut Thepayasuwan, Alex Dob...