Sciweavers

1152 search results - page 96 / 231
» Stub-Code Performance Is Becoming Important
Sort
View
128
Voted

Publication
265views
16 years 1 months ago
Effective 2D-3D Medical Image Registration using Support Vector Machine
Registration of pre-operative 3D volume dataset and intra-operative 2D images gradually becomes an important technique to assist radiologists in diagnosing complicated diseases. In...
Wenyuan Qi, Lixu Gu
ICCD
2008
IEEE
124views Hardware» more  ICCD 2008»
16 years 27 days ago
Global bus route optimization with application to microarchitectural design exploration
— Circuit and processor designs will continue to increase in complexity for the foreseeable future. With these increasing sizes comes the use of wide buses to move large amounts ...
Dae Hyun Kim, Sung Kyu Lim
111
Voted
ICCD
2005
IEEE
114views Hardware» more  ICCD 2005»
16 years 27 days ago
Memory Bank Predictors
Cache memories are commonly implemented through multiple memory banks to improve bandwidth and latency. The early knowledge of the data cache bank that an instruction will access ...
Stefan Bieschewski, Joan-Manuel Parcerisa, Antonio...
137
Voted
ICCAD
2002
IEEE
107views Hardware» more  ICCAD 2002»
16 years 26 days ago
Theoretical and practical validation of combined BEM/FEM substrate resistance modeling
In mixed-signal designs, substrate noise originating from the digital part can seriously influence the functionality of the analog part. As such, accurately modeling the properti...
Eelco Schrik, Patrick Dewilde, N. P. van der Meijs
CTRSA
2010
Springer
172views Cryptology» more  CTRSA 2010»
15 years 10 months ago
Revisiting Higher-Order DPA Attacks:
Security devices are vulnerable to side-channel attacks that perform statistical analysis on data leaked from cryptographic computations. Higher-order (HO) attacks are a powerful a...
Benedikt Gierlichs, Lejla Batina, Bart Preneel, In...