Sciweavers

50 search results - page 8 / 10
» jsa 2006
Sort
View
JSA
2006
86views more  JSA 2006»
14 years 9 months ago
The design and utility of the ML-RSIM system simulator
Execution-driven simulation has become the primary method for evaluating architectural techniques as it facilitates rapid design space exploration without the cost of building pro...
Lambert Schaelicke, Michael Parker
98
Voted
JSA
2006
113views more  JSA 2006»
14 years 9 months ago
A power-efficient TCAM architecture for network forwarding tables
Stringent memory access and search speed requirements are two of the main bottlenecks in wire speed processing. Most viable search engines are implemented in content addressable m...
Taskin Koçak, Faysal Basci
JSA
2006
131views more  JSA 2006»
14 years 9 months ago
Bidirectional liveness analysis, or how less than half of the Alpha's registers are used
Interprocedural data flow analyses of executable programs suffer from the conservative assumptions that need to be made because no precise control flow graph is available and beca...
Bjorn De Sutter, Bruno De Bus, Koen De Bosschere
JSA
2007
100views more  JSA 2007»
14 years 9 months ago
Resource consumption-aware QoS in cluster-based VOD servers
For Video-On-Demand (VOD) systems, it is important to provide Quality of Service (QoS) to more clients under limited resources. In this paper, the performance scalability in clust...
Dongmahn Seo, Joahyoung Lee, Yoon Kim, Changyeol C...
JSA
2007
139views more  JSA 2007»
14 years 9 months ago
High-speed hardware implementations of Elliptic Curve Cryptography: A survey
For the last decade, Elliptic Curve Cryptography (ECC) has gained increasing acceptance in the industry and the academic community and has been the subject of several standards. T...
Guerric Meurice de Dormale, Jean-Jacques Quisquate...