This paper presents a methodology for monitoring security in Application Specific Instruction-set Processors (ASIPs). This is a generalized methodology for inline monitoring insec...
Roshan G. Ragel, Sri Parameswaran, Sayed Mohammad ...
Software reuse has been demonstrated to increase productivity, reduce costs, and improve software quality. The research that has addressed this problem has concentrated on code cr...
Letha H. Etzkorn, Carl G. Davis, Lisa L. Bowen, Ja...
Many cryptographic tasks and protocols, such as non-repudiation, contract-signing, voting, auction, identity-based encryption, and certain forms of secure multi-party computation,...
A motion estimation algorithm using wavelet approximation as an optical ow model has been developed to estimate accurate dense optical ow from an image sequence. This wavelet moti...
Yu-Te Wu, Takeo Kanade, Jeffrey F. Cohn, Ching-Chu...
- The accelerator is destined to circuit-level simulation of digital and analog/digital MOS VLSI'c containing of up to 100 thousand transistors (with 16 Mb RAM host-machine). ...