Sciweavers

2663 search results - page 51 / 533
» The Design, Implementation, and Evaluation of Jade
Sort
View
CAL
2002
14 years 9 months ago
Implementing Decay Techniques using 4T Quasi-Static Memory Cells
Abstract-This paper proposes the use of four-transistor (4T) cache and branch predictor array cell designs to address increasing worries regarding leakage power dissipation. While ...
Philo Juang, Phil Diodato, Stefanos Kaxiras, Kevin...
ISICT
2003
14 years 11 months ago
On the automated implementation of modal logics used to verify security protocols
: Formal verification provides a rigid and thorough means of evaluating the correctness of cryptographic protocols so that even subtle defects can be identified. As the application...
Tom Coffey, Reiner Dojen, Tomas Flanagan
IWANN
1993
Springer
15 years 1 months ago
Hardware Implementations of Artificial Neural Networks
Over the past decade a large variety of hardware has been designed to exploit the inherent parallelism of the artificial neural network models. This paper presents an overview of ...
Dante Del Corso
ISCAS
2005
IEEE
187views Hardware» more  ISCAS 2005»
15 years 3 months ago
New cost-effective VLSI implementation of multiplierless FIR filter using common subexpression elimination
Abstract— In this paper, we propose a novel common subexpresson elimination (CSE) method to be used for VLSI design of multiplierless finite impulse response (FIR) filter with ...
Yasuhiro Takahashi, Michio Yokoyama
ASIAN
2005
Springer
103views Algorithms» more  ASIAN 2005»
15 years 3 months ago
Implementing a Tamper-Evident Database System
Abstract. Data integrity is an assurance that data has not been modified in an unknown or unauthorized manner. The goal of this paper is to allow a user to leverage a small amount...
Gerome Miklau, Dan Suciu