Sciweavers

8503 search results - page 1405 / 1701
» Secure Software Architectures
Sort
View
123
Voted
MTA
2011
203views Hardware» more  MTA 2011»
14 years 7 months ago
Interoperable digital rights management based on the MPEG Extensible Middleware
Abstract This paper describes an interoperable Digital Rights Management architecture promoted by the MPEG standardization group in its new standard known as MPEG-M or MPEG Extensi...
Víctor Rodríguez-Doncel, Jaime Delga...
HOTNETS
2010
14 years 7 months ago
Successive interference cancellation: a back-of-the-envelope perspective
Successive interference cancellation (SIC) is a physical layer capability that allows a receiver to decode packets that arrive simultaneously. While the technique is well known in...
Souvik Sen, Naveen Santhapuri, Romit Roy Choudhury...
113
Voted
PRESENCE
2010
76views more  PRESENCE 2010»
14 years 7 months ago
Modularity for Large Virtual Reality Applications
This paper focuses on the design of high performance VR applications. These applications usually involve various I/O devices and complex simulations. A parallel architecture or gri...
Jérémie Allard, Jean-Denis Lesage, B...
245
Voted
FPGA
2011
ACM
401views FPGA» more  FPGA 2011»
14 years 4 months ago
LegUp: high-level synthesis for FPGA-based processor/accelerator systems
In this paper, we introduce a new open source high-level synthesis tool called LegUp that allows software techniques to be used for hardware design. LegUp accepts a standard C pro...
Andrew Canis, Jongsok Choi, Mark Aldham, Victor Zh...
DAC
2009
ACM
16 years 1 months ago
Non-intrusive dynamic application profiling for multitasked applications
Application profiling ? the process of monitoring an application to determine the frequency of execution within specific regions ? is an essential step within the design process f...
Karthik Shankar, Roman L. Lysecky
« Prev « First page 1405 / 1701 Last » Next »