Sciweavers

1145 search results - page 154 / 229
» The Correctness of an Optimized Code Generation
Sort
View
ICIP
2010
IEEE
14 years 9 months ago
Randomly driven fuzzy key extraction of unclonable images
In this paper, we develop an adjustable Fuzzy Extractor using the Physical Unclonable Functions (PUF) obtained by a common laser engraving method to sign physical objects. In part...
Saloomeh Shariati, Laurent Jacques, Françoi...
ICDAR
2011
IEEE
13 years 11 months ago
Low Resolution QR-Code Recognition by Applying Super-Resolution Using the Property of QR-Codes
—This paper proposes a method for low resolution QR-code recognition. A QR-code is a two-dimensional binary symbol that can embed various information such as characters and numbe...
Yuji Kato, Daisuke Deguchi, Tomokazu Takahashi, Ic...
MICRO
2003
IEEE
258views Hardware» more  MICRO 2003»
15 years 5 months ago
LLVA: A Low-level Virtual Instruction Set Architecture
A virtual instruction set architecture (V-ISA) implemented via a processor-specific software translation layer can provide great flexibility to processor designers. Recent examp...
Vikram S. Adve, Chris Lattner, Michael Brukman, An...
ISCA
2000
IEEE
111views Hardware» more  ISCA 2000»
15 years 4 months ago
HLS: combining statistical and symbolic simulation to guide microprocessor designs
As microprocessors continue to evolve, many optimizations reach a point of diminishing returns. We introduce HLS, a hybrid processor simulator which uses statistical models and sy...
Mark Oskin, Frederic T. Chong, Matthew K. Farrens
JILP
2002
83views more  JILP 2002»
14 years 11 months ago
Using Statistical and Symbolic Simulation for Microprocessor Performance Evaluation
As microprocessor designs continue to evolve, many optimizations reach a point of diminishing returns. We introduce HLS, a hybrid processor simulator which uses statistical models...
Mark Oskin, Frederic T. Chong, Matthew K. Farrens