Default Cover Image

ASAP 2010 - 21st IEEE International Conference on Application-specific Systems, Architectures and Processors

July 7 2010 to July 9 2010

Rennes

Table of Contents

The light at the end of the CMOS tunnelFreely available from IEEE.pp. 4-9
Dynamic code mapping for limited local memory systemsFull-text access may be available. Sign in or learn about subscription options.pp. 13-20
Design of an Automatic Target Recognition algorithm on the IBM Cell Broadband EngineFull-text access may be available. Sign in or learn about subscription options.pp. 21-28
Highly efficient mapping of the Smith-Waterman algorithm on CUDA-compatible GPUsFull-text access may be available. Sign in or learn about subscription options.pp. 29-36
Session 2: Design space exploration [breaker page]Freely available from IEEE.pp. 1-1
ImpEDE: A multidimensional design-space exploration framework for biomedical-implant processorsFull-text access may be available. Sign in or learn about subscription options.pp. 39-46
Design space exploration of parametric pipelined designsFull-text access may be available. Sign in or learn about subscription options.pp. 47-54
Session 4: Formal methods [breaker page]Freely available from IEEE.pp. 1-1
Modeling and synthesis of communication subsystems for loop accelerator pipelinesFull-text access may be available. Sign in or learn about subscription options.pp. 125-132
Design of throughput-optimized arrays from recurrence abstractionsFull-text access may be available. Sign in or learn about subscription options.pp. 133-140
A C++-embedded Domain-Specific Language for programming the MORA soft processor arrayFull-text access may be available. Sign in or learn about subscription options.pp. 141-148
Combined scheduling and instruction selection for processors with reconfigurable cell fabricFull-text access may be available. Sign in or learn about subscription options.pp. 167-174
Completeness of automatically generated instruction selectorsFull-text access may be available. Sign in or learn about subscription options.pp. 175-182
Implementation of binary edwards curves for very-constrained devicesFull-text access may be available. Sign in or learn about subscription options.pp. 185-191
Elliptic Curve point multiplication on GPUsFull-text access may be available. Sign in or learn about subscription options.pp. 192-199
Newton-Raphson algorithms for floating-point division using an FMAFull-text access may be available. Sign in or learn about subscription options.pp. 200-207
An FPGA-specific algorithm for direct generation of multi-variate Gaussian random numbersFull-text access may be available. Sign in or learn about subscription options.pp. 208-215
Automatic generation of polynomial-based hardware architectures for function evaluationFull-text access may be available. Sign in or learn about subscription options.pp. 216-222
A fully-overlapped multi-mode QC-LDPC decoder architecture for mobile WiMAX applicationsFull-text access may be available. Sign in or learn about subscription options.pp. 225-232
A high efficient memory architecture for H.264/AVC motion compensationFull-text access may be available. Sign in or learn about subscription options.pp. 239-245
FPGA-based lossless compressors of floating-point data streams to enhance memory bandwidthFull-text access may be available. Sign in or learn about subscription options.pp. 246-253
Session 9: Power-aware architectures [breaker page]Freely available from IEEE.pp. 1-1
Power dissipation challenges in multicore floating-point unitsFull-text access may be available. Sign in or learn about subscription options.pp. 257-264
On energy efficiency of reconfigurable systems with run-time partial reconfigurationFull-text access may be available. Sign in or learn about subscription options.pp. 265-272
A GALS FFT processor with clock modulation for low-EMI applicationsFull-text access may be available. Sign in or learn about subscription options.pp. 273-278
Hardware-assisted middleware: Acceleration of garbage collection operationsFull-text access may be available. Sign in or learn about subscription options.pp. 281-284
Flexible hardware/software co-design for scalable elliptic curve cryptography for low-resource applicationsFull-text access may be available. Sign in or learn about subscription options.pp. 285-288
Potential of using block floating point arithmetic in ASIP-based GNSS-receiversFull-text access may be available. Sign in or learn about subscription options.pp. 293-296
Area optimized H.264 Intra prediction architecture for 1080p HD resolutionFull-text access may be available. Sign in or learn about subscription options.pp. 297-300
Memoryless RNS-to-binary converters for the {2n+1 - 1, 2n, 2n - 1} moduli setFull-text access may be available. Sign in or learn about subscription options.pp. 301-304
A pipelined camellia architecture for compact hardware implementationFull-text access may be available. Sign in or learn about subscription options.pp. 305-308
General-purpose FPGA platform for efficient encryption and hashingFull-text access may be available. Sign in or learn about subscription options.pp. 309-312
A New approach in on-line task scheduling for reconfigurable computing systemsFull-text access may be available. Sign in or learn about subscription options.pp. 321-324
Exploring algorithmic trading in reconfigurable hardwareFull-text access may be available. Sign in or learn about subscription options.pp. 325-328
Customizing controller instruction sets for application-specific architecturesFull-text access may be available. Sign in or learn about subscription options.pp. 337-340
Loop transformations for interface-based hierarchies IN SDF graphsFull-text access may be available. Sign in or learn about subscription options.pp. 341-344
Code generation for hardware accelerated AESFull-text access may be available. Sign in or learn about subscription options.pp. 345-348
Function flattening for lease-based, information-leak-free systemsFull-text access may be available. Sign in or learn about subscription options.pp. 349-352
Showing 61 out of 61