• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 16,334
Next 10 →

Hardware Architectures

by Sujin Philip, Brian Summa, Valerio Pascucci
"... ● Clusters of commodity hardware are the most ubiquitous form of computing power available today. ● The processing power of such clusters has been consistently increasing. ● This performance increase is not only due to the increase in the number of connected nodes but also due to the increase in ava ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
● Clusters of commodity hardware are the most ubiquitous form of computing power available today. ● The processing power of such clusters has been consistently increasing. ● This performance increase is not only due to the increase in the number of connected nodes but also due to the increase

Hardware Architecture for Protocol Processing

by Tomas Henriksson
"... iii Protocol processing is increasingly important. Through the years the hardware architectures for network equipment have evolved constantly. It is important to make a difference between terminals and routers and the different processing tasks they encounter. It is also important to analyze in deta ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
iii Protocol processing is increasingly important. Through the years the hardware architectures for network equipment have evolved constantly. It is important to make a difference between terminals and routers and the different processing tasks they encounter. It is also important to analyze

Deconstructing hardware architectures for security

by Michael Dalton, Hari Kannan, Christos Kozyrakis - 5th Annual Workshop on Duplicating, Deconstructing, and Debunking (WDDD) at ISCA , 2006
"... Researchers have recently proposed novel hardware architectures for enhancing system security. The proposed architectures address security threats such as buffer overflows, format string bugs, and information disclosure. The main advantage of hardware support is increased visibility into system stat ..."
Abstract - Cited by 22 (6 self) - Add to MetaCart
Researchers have recently proposed novel hardware architectures for enhancing system security. The proposed architectures address security threats such as buffer overflows, format string bugs, and information disclosure. The main advantage of hardware support is increased visibility into system

Hardware Architectures for Mobile Robots

by Leopoldo Armesto, Juan Carlos, Torres Josep Tornero
"... Abstract: This paper deals with the general problem of designing hardware architectures for mobile robots. In particular, four different architectures of mobile robots have been studied. An architecture for an industrial forklift, used in the automation of management and transport processes is first ..."
Abstract - Add to MetaCart
Abstract: This paper deals with the general problem of designing hardware architectures for mobile robots. In particular, four different architectures of mobile robots have been studied. An architecture for an industrial forklift, used in the automation of management and transport processes

A Survey of Hardware Architectures Designed for Speech Recognition

by Hsiao-wuen Hon, Hsiao-wuen Hon , 1991
"... A survey of hardware architectures designed for speech recognition ..."
Abstract - Cited by 9 (0 self) - Add to MetaCart
A survey of hardware architectures designed for speech recognition

Comparison of The hardware Architecture and FPGA

by M. D. Galanis, P. Kitsos, G. Kostopoulos, N. Sklavos, O. Koufopavlou, C. E. Goutis - Implementation of Stream Cipher’, Electronics, Circuits and Systems, 2004. ICECS 2004. Proceedings of the 2004 11th IEEE International Conference, 2004
"... In this paper, the hardware implementations of five representative stream ciphers are compared in terms of performance and consumed area. The ciphers used for the comparison are the A5/1, W7, E0, RC4 and Helix. The first three ones have been used for the security part of wellknown standards. The Hel ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
In this paper, the hardware implementations of five representative stream ciphers are compared in terms of performance and consumed area. The ciphers used for the comparison are the A5/1, W7, E0, RC4 and Helix. The first three ones have been used for the security part of wellknown standards

Cryptographic Hardware Architecture

by Savithri Venkatachalapathy , 2002
"... Abstract — In this paper we have tried to present a descriptive description of Cryptographic Hardware. Cryptography itself is a math that provides the security in many technologies, including all digital certificate and encryption systems. Either Software or Hardware implementations of cryptography ..."
Abstract - Add to MetaCart
Abstract — In this paper we have tried to present a descriptive description of Cryptographic Hardware. Cryptography itself is a math that provides the security in many technologies, including all digital certificate and encryption systems. Either Software or Hardware implementations of cryptography

Abstract A Hardware Architecture for

by Cyril Flaig, Surface Splatting, Simon Heinzle, Simon Mall, Timo Aila, Kaspar Rohrer
"... We present a novel architecture for hardware-accelerated rendering of point primitives. Our pipeline implements a refined version of EWA splatting, a high quality method for antialiased rendering of point sampled representations. A central feature of our design is the seamless integration of the arc ..."
Abstract - Add to MetaCart
We present a novel architecture for hardware-accelerated rendering of point primitives. Our pipeline implements a refined version of EWA splatting, a high quality method for antialiased rendering of point sampled representations. A central feature of our design is the seamless integration

Enlisting Hardware Architecture

by To Thwart Malicious, Ruby B. Lee, David K. Karig, John P. Mcgregor, Zhijie Shi - In Proceedings of the 2003 International Conference on Security in Pervasive Computing , 2003
"... Software vulnerabilities that enable the injection and execution of malicious code in pervasive Internet-connected computing devices pose serious threats to cyber security. In a common type of attack, a hostile party induces a software buffer overflow in a susceptible computing device in order to ..."
Abstract - Add to MetaCart
Software vulnerabilities that enable the injection and execution of malicious code in pervasive Internet-connected computing devices pose serious threats to cyber security. In a common type of attack, a hostile party induces a software buffer overflow in a susceptible computing device in order to corrupt a procedure return address and transfer control to malicious code. These buffer overflow attacks are often employed to recruit oblivious hosts into distributed denial of service (DDoS) attack networks, which ultimately launch devastating DDoS attacks against victim networks or machines. In spite of existing software countermeasures that seek to prevent buffer overflow exploits, many systems remain vulnerable.

Hardware architecture Results and conclusion

by Multiplication Over Fp, Nicolas Guillermin, Let M , 2010
"... i=1mi a set of coprime RNS form of X < M is {x1,..., xn} such that xi = |X |mi (1) X = n−1∑ i=0 (|xi.M−1i |mi)×Mi ..."
Abstract - Add to MetaCart
i=1mi a set of coprime RNS form of X < M is {x1,..., xn} such that xi = |X |mi (1) X = n−1∑ i=0 (|xi.M−1i |mi)×Mi
Next 10 →
Results 1 - 10 of 16,334
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University