NUK - logo

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources NUK. For full access, REGISTER.

48 49 50
hits: 2,249
491.
  • Routability-Enhanced Schedu... Routability-Enhanced Scheduling for Application Mapping on CGRAs
    Mu, Song; Zeng, Yi; Wang, Bo IEEE access, 2021, Volume: 9
    Journal Article
    Peer reviewed
    Open access

    Coarse-Grained Reconfigurable Architectures (CGRAs) are a promising solution to domain-specific applications for their energy efficiency and flexibility. To improve performance on CGRA, modulo ...
Full text

PDF
492.
  • HDR-TOF: HDR Time-of-Flight Imaging via Modulo Acquisition
    Shtendel, Gal; Bhandari, Ayush 2022 IEEE International Conference on Image Processing (ICIP), 2022-Oct.-16
    Conference Proceeding

    Time-of-Flight (ToF) imagers, e.g. Microsoft Kinect, are active devices that offer a portable, efficient and a consumer-grade solution to three dimensional imaging problems. As the name suggests, in ...
Full text
493.
  • Counter machines, Petri Net... Counter machines, Petri Nets, and consensual computation
    Crespi Reghizzi, Stefano; San Pietro, Pierluigi Theoretical computer science, 02/2017, Volume: 664
    Journal Article
    Peer reviewed
    Open access

    We establish the relation between two language recognition models that use counters and operate in real-time: Greibach's partially blind machines operating in real time (RT-PBLIND), which recognize ...
Full text

PDF
494.
  • Garakabu2: an SMT-based bou... Garakabu2: an SMT-based bounded model checker for HSTM designs in ZIPC
    Kong, Weiqiang; Hou, Gang; Hu, Xiangpei ... Journal of information security and applications, 12/2016, Volume: 31
    Journal Article
    Peer reviewed

    Hierarchical State Transition Matrix (HSTM) is a table-based modeling language that has been broadly used for developing software designs of embedded systems. In this paper, we describe a model ...
Full text
495.
Full text

PDF
496.
  • Alan Turing's Systems of Logic Alan Turing's Systems of Logic
    Appel, Andrew W 2021, 2021-10-12
    eBook

    A facsimile edition of Alan Turing's influential Princeton thesis Between inventing the concept of a universal computer in 1936 and breaking the German Enigma code during World War II, Alan Turing ...
Full text
497.
  • Multi-bit robust image steg... Multi-bit robust image steganography based on modular arithmetic
    Datta, Biswajita; Roy, Sudipta; Roy, Subhranil ... Multimedia tools and applications, 2019/1, Volume: 78, Issue: 2
    Journal Article
    Peer reviewed

    The main objective is to design a robust algorithm which can hide multiple target bits without direct replacement of the bits of cover image and at the same time maintain perceptibility of carrier ...
Full text
498.
  • Multirow Complementary-FET ... Multirow Complementary-FET (CFET) Standard Cell Synthesis Framework Using Satisfiability Modulo Theories (SMTs)
    Cheng, Chung-Kuan; Ho, Chia-Tung; Lee, Daeyeal ... IEEE journal on exploratory solid-state computational devices and circuits, 06/2021, Volume: 7, Issue: 1
    Journal Article
    Peer reviewed
    Open access

    With the relentless scaling of technology nodes, the track number reduction of conventional (Conv.) cell is starting to reach its limitations due to limited routing resources, lateral p-n ...
Full text

PDF
499.
  • Similarity-Aware Architectu... Similarity-Aware Architecture/Compiler Co-Designed Context-Reduction Framework for Modulo-Scheduled CGRA
    Zhao, Zhongyuan; Sheng, Weiguang; Li, Jinchao ... Electronics, 09/2021, Volume: 10, Issue: 18
    Journal Article
    Peer reviewed
    Open access

    Modulo-scheduled coarse-grained reconfigurable array (CGRA) processors have shown their potential for exploiting loop-level parallelism at high energy efficiency. However, these CGRAs need frequent ...
Full text

PDF
500.
  • Performance of the most com... Performance of the most common non-cryptographic hash functions
    Estébanez, César; Saez, Yago; Recio, Gustavo ... Software, practice & experience, June 2014, Volume: 44, Issue: 6
    Journal Article
    Peer reviewed
    Open access

    SUMMARY Non‐cryptographic hash functions (NCHFs) have an immense number of applications, ranging from compilers and databases to videogames and computer networks. Some of the most important NCHF have ...
Full text

PDF

You have reached the maximum number of search results that are displayed.

  • For better performance, the search offers a maximum of 1,000 results per query (or 50 pages if the option 10/page is selected).
  • Consider using result filters or changing the sort order to explore your results further.
48 49 50
hits: 2,249

Load filters