Search

Your search keyword '"Datapath"' showing total 392 results

Search Constraints

Start Over You searched for: Descriptor "Datapath" Remove constraint Descriptor: "Datapath" Topic computer Remove constraint Topic: computer
392 results on '"Datapath"'

Search Results

1. Software Physical/Virtual Rx Queue Mapping Toward High-Performance Containerized Networking

2. Countering Load-to-Use Stalls in the NVIDIA Turing GPU

3. AWARE-CNN: Automated Workflow for Application-Aware Real-Time Edge Acceleration of CNNs

4. Power-Efficient Approximate Newton–Raphson Integer Divider Applied to NLMS Adaptive Filter for High-Quality Interference Cancelling

5. Analyzing the noise robustness of deep neural networks

6. A Feedback-Friendly Large-Scale Clocking Scheme for Adiabatic Quantum-Flux-Parametron Logic Datapaths

7. Effective datapath logic extraction techniques using connection vectors

8. All-Digital Time-to-Digital Converter Design Methodology Based on Structured Data Paths

9. Coarse-Grained Reconfigurable Computing with the Versat Architecture

10. Using ASMD-FSMD Technique for Digital Device Design

11. Digital Device Design by ASMD-FSMD Technique

12. LineFS: Efficient SmartNIC Offload of a Distributed File System with Pipeline Parallelism

13. Leveraging P4 Flexibility to Expose Target-specific Features

14. Compact CNN Training Accelerator with Variable Floating-Point Datapath

15. Mind the Gap: Bridging Verilog and Computer Architecture

16. FPGA Implementation of PICO Cipher

17. RANTT: A RISC-V Architecture Extension for the Number Theoretic Transform

18. Compiling synchronous languages to optimal move code for exposed datapath architectures

19. SOFF: An OpenCL High-Level Synthesis Framework for FPGAs

20. Genetic Programming of Pipelined Datapaths for FPGA

21. Hardware Security for DSP Circuits Using Key-Based Time-Dependent Obfuscation

22. DLockout: A Design Lockout Technique for Key Obfuscated RTL IP Designs

23. Toward a Sweet Spot of Data Plane Programmability, Portability, and Performance: On the Scalability of Multi-Architecture P4 Pipelines

24. RETRACTED: An optimized reconfigurable algorithm for FPGA architecture oriented IoT applications

25. Adaptive Approximate Computing in Arithmetic Datapaths

26. Optimal Scheduling for Exposed Datapath Architectures with Buffered Processing Units by ASP

27. A controlled fetching technique for effective management of shared resources in SMT processors

28. A High-Speed VLSI Architecture for Motion Estimation Using Modified Adaptive Rood Pattern Search Algorithm

29. Elliptic-Curve Crypto Processor for RFID Applications

30. Unified Programmability of Virtualized Network Functions and Software-Defined Wireless Networks

31. Computer Generation of High Throughput and Memory Efficient Sorting Designs on FPGA

32. Building an Extensible Open vSwitch Datapath

33. Efficient Hardware Verification Using Machine Learning Approach

34. Extraction of Structural Regularity for Random Logic Netlists

35. ASIC Implementation of Pipelined Blowfish Cryptographic Core in 0.13 µm CMOS Process Technology

36. Enforcing Last-Level Cache Partitioning through Memory Virtual Channels

37. A Very Compact Architecture of CLEFIA Block Cipher for Secure IoT Systems

38. AEx : Automated Customization of Exposed Datapath Soft-Cores

39. Practical Safe Linux Kernel Extensibility

40. AMC: An Asynchronous Memory Compiler

41. Efficient Posit Multiply-Accumulate Unit Generator for Deep Learning Applications

42. Low Power Datapath Architecture for Multiply - Accumulate (MAC) Unit

43. Impact of FPGA Architecture on Area and Performance of CGRA Overlays

44. Coarsely Quantized Digital Correlators for Passive Millimeter Wave Imagers: A Hardware Perspective

45. FLIP:FLexible IoT Path Programming Framework for Large-scale IoT

46. Automatic Pipelining and Vectorization of Scientific Code for FPGAs

47. Efficient resource sharing algorithm for physical register file in simultaneous multi-threading processors

48. A Compiler Approach for Exploiting Partial SIMD Parallelism

49. A 4-bit Architecture of SEED Block Cipher for IoT Applications

50. CritICs Critiquing Criticality in Mobile Apps

Catalog

Books, media, physical & digital resources