Results 1 - 10
of
16,334
Hardware Architectures
"... ● Clusters of commodity hardware are the most ubiquitous form of computing power available today. ● The processing power of such clusters has been consistently increasing. ● This performance increase is not only due to the increase in the number of connected nodes but also due to the increase in ava ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
● Clusters of commodity hardware are the most ubiquitous form of computing power available today. ● The processing power of such clusters has been consistently increasing. ● This performance increase is not only due to the increase in the number of connected nodes but also due to the increase
Hardware Architecture for Protocol Processing
"... iii Protocol processing is increasingly important. Through the years the hardware architectures for network equipment have evolved constantly. It is important to make a difference between terminals and routers and the different processing tasks they encounter. It is also important to analyze in deta ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
iii Protocol processing is increasingly important. Through the years the hardware architectures for network equipment have evolved constantly. It is important to make a difference between terminals and routers and the different processing tasks they encounter. It is also important to analyze
Deconstructing hardware architectures for security
- 5th Annual Workshop on Duplicating, Deconstructing, and Debunking (WDDD) at ISCA
, 2006
"... Researchers have recently proposed novel hardware architectures for enhancing system security. The proposed architectures address security threats such as buffer overflows, format string bugs, and information disclosure. The main advantage of hardware support is increased visibility into system stat ..."
Abstract
-
Cited by 22 (6 self)
- Add to MetaCart
Researchers have recently proposed novel hardware architectures for enhancing system security. The proposed architectures address security threats such as buffer overflows, format string bugs, and information disclosure. The main advantage of hardware support is increased visibility into system
Hardware Architectures for Mobile Robots
"... Abstract: This paper deals with the general problem of designing hardware architectures for mobile robots. In particular, four different architectures of mobile robots have been studied. An architecture for an industrial forklift, used in the automation of management and transport processes is first ..."
Abstract
- Add to MetaCart
Abstract: This paper deals with the general problem of designing hardware architectures for mobile robots. In particular, four different architectures of mobile robots have been studied. An architecture for an industrial forklift, used in the automation of management and transport processes
A Survey of Hardware Architectures Designed for Speech Recognition
, 1991
"... A survey of hardware architectures designed for speech recognition ..."
Abstract
-
Cited by 9 (0 self)
- Add to MetaCart
A survey of hardware architectures designed for speech recognition
Comparison of The hardware Architecture and FPGA
- Implementation of Stream Cipher’, Electronics, Circuits and Systems, 2004. ICECS 2004. Proceedings of the 2004 11th IEEE International Conference, 2004
"... In this paper, the hardware implementations of five representative stream ciphers are compared in terms of performance and consumed area. The ciphers used for the comparison are the A5/1, W7, E0, RC4 and Helix. The first three ones have been used for the security part of wellknown standards. The Hel ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
In this paper, the hardware implementations of five representative stream ciphers are compared in terms of performance and consumed area. The ciphers used for the comparison are the A5/1, W7, E0, RC4 and Helix. The first three ones have been used for the security part of wellknown standards
Cryptographic Hardware Architecture
, 2002
"... Abstract — In this paper we have tried to present a descriptive description of Cryptographic Hardware. Cryptography itself is a math that provides the security in many technologies, including all digital certificate and encryption systems. Either Software or Hardware implementations of cryptography ..."
Abstract
- Add to MetaCart
Abstract — In this paper we have tried to present a descriptive description of Cryptographic Hardware. Cryptography itself is a math that provides the security in many technologies, including all digital certificate and encryption systems. Either Software or Hardware implementations of cryptography
Abstract A Hardware Architecture for
"... We present a novel architecture for hardware-accelerated rendering of point primitives. Our pipeline implements a refined version of EWA splatting, a high quality method for antialiased rendering of point sampled representations. A central feature of our design is the seamless integration of the arc ..."
Abstract
- Add to MetaCart
We present a novel architecture for hardware-accelerated rendering of point primitives. Our pipeline implements a refined version of EWA splatting, a high quality method for antialiased rendering of point sampled representations. A central feature of our design is the seamless integration
Enlisting Hardware Architecture
- In Proceedings of the 2003 International Conference on Security in Pervasive Computing
, 2003
"... Software vulnerabilities that enable the injection and execution of malicious code in pervasive Internet-connected computing devices pose serious threats to cyber security. In a common type of attack, a hostile party induces a software buffer overflow in a susceptible computing device in order to ..."
Abstract
- Add to MetaCart
Software vulnerabilities that enable the injection and execution of malicious code in pervasive Internet-connected computing devices pose serious threats to cyber security. In a common type of attack, a hostile party induces a software buffer overflow in a susceptible computing device in order to corrupt a procedure return address and transfer control to malicious code. These buffer overflow attacks are often employed to recruit oblivious hosts into distributed denial of service (DDoS) attack networks, which ultimately launch devastating DDoS attacks against victim networks or machines. In spite of existing software countermeasures that seek to prevent buffer overflow exploits, many systems remain vulnerable.
Hardware architecture Results and conclusion
, 2010
"... i=1mi a set of coprime RNS form of X < M is {x1,..., xn} such that xi = |X |mi (1) X = n−1∑ i=0 (|xi.M−1i |mi)×Mi ..."
Abstract
- Add to MetaCart
i=1mi a set of coprime RNS form of X < M is {x1,..., xn} such that xi = |X |mi (1) X = n−1∑ i=0 (|xi.M−1i |mi)×Mi
Results 1 - 10
of
16,334