Sciweavers

2663 search results - page 78 / 533
» The Design, Implementation, and Evaluation of Jade
Sort
View
ASAP
2010
IEEE
193views Hardware» more  ASAP 2010»
14 years 11 months ago
Automatic generation of polynomial-based hardware architectures for function evaluation
Abstract--Polynomial approximation is a very general technique for the evaluation of a wide class of numerical functions of one variable. This article details an architecture gener...
Florent de Dinechin, Mioara Joldes, Bogdan Pasca
ISCAS
2007
IEEE
123views Hardware» more  ISCAS 2007»
15 years 4 months ago
Evaluating Network-on-Chip for Homogeneous Embedded Multiprocessors in FPGAs
— This paper presents performance and area evaluation of a homogeneous multiprocessor communication system based on network-on-chip (NoC) in FPGA platforms. Two homogenous chip m...
Henrique C. Freitas, Dalton M. Colombo, Fernanda L...
ASSETS
2007
ACM
15 years 1 months ago
Evaluating American Sign Language generation through the participation of native ASL signers
We discuss important factors in the design of evaluation studies for systems that generate animations of American Sign Language (ASL) sentences. In particular, we outline how some...
Matt Huenerfauth, Liming Zhao, Erdan Gu, Jan M. Al...
ESCIENCE
2006
IEEE
15 years 3 months ago
A Middleware Framework for Maximum Likelihood Evaluation over Dynamic Grids
We have designed a maximum likelihood fitter using the actor model to distribute the computation over a heterogeneous network. The prototype implementation uses the SALSA program...
Wei-Jen Wang, Kaoutar El Maghraoui, John Cummings,...
CMS
2006
175views Communications» more  CMS 2006»
14 years 11 months ago
Attack Graph Based Evaluation of Network Security
Abstract. The perspective directions in evaluating network security are simulating possible malefactor's actions, building the representation of these actions as attack graphs...
Igor V. Kotenko, Mikhail Stepashkin