Sciweavers

18918 search results - page 3624 / 3784
» Using Technology in Teaching
Sort
View
ICCAD
2005
IEEE
147views Hardware» more  ICCAD 2005»
16 years 1 months ago
NoCEE: energy macro-model extraction methodology for network on chip routers
In this paper we present NoCEE, a fast and accurate method for extracting energy models for packet-switched Network on Chip (NoC) routers. Linear regression is used to model the r...
Jeremy Chan, Sri Parameswaran
ICCAD
2004
IEEE
155views Hardware» more  ICCAD 2004»
16 years 1 months ago
A flexibility aware budgeting for hierarchical flow timing closure
—In this paper, we present a new block budgeting algorithm which speeds up timing closure in timing driven hierarchical flows. After a brief description of the addressed flow, ...
Olivier Omedes, Michel Robert, Mohammed Ramdani
ICCAD
2004
IEEE
102views Hardware» more  ICCAD 2004»
16 years 1 months ago
True crosstalk aware incremental placement with noise map
Crosstalk noise has become an important issue as technology scales down for timing and signal integrity closure. Existing works to fix crosstalk noise are mostly done at the rout...
Haoxing Ren, David Zhigang Pan, Paul Villarrubia
IUI
2009
ACM
16 years 1 months ago
Trailblazer: enabling blind users to blaze trails through the web
For blind web users, completing tasks on the web can be frustrating. Each step can require a time-consuming linear search of the current web page to find the needed interactive e...
Jeffrey P. Bigham, Tessa A. Lau, Jeffrey Nichols
148
Voted
WISEC
2010
ACM
16 years 1 days ago
Providing security with insecure systems
Abstract A Martian who arrived on Earth today would surely conclude that computing and communications security are in a crisis situation. The popular media as well as technical pub...
Andrew M. Odlyzko
« Prev « First page 3624 / 3784 Last » Next »