نتایج جستجو برای: custom instruction

تعداد نتایج: 62212  

1998
Kristian Wiklund Tomas Magnusson Peter Dahlgren

This paper investigates the degradation in diagnosability of bridging faults caused by situations of active feedback and logically unresolvable intermediate values under different fault modeling assumptions. The experimental results show that active feedback may reduce the fault coverage by as much as 7% for stuck-at test sets and realistic bridging fault sets. A test generation method for full...

1995
Alberto Broggi

This paper presents the vision-based road detection system currently operative onto the MOB-LAB land vehicle. Based on a full-custom low-cost massively parallel system, it achieves real-time performances (' 17 Hz) in the processing of image sequences, thanks to the extremely eecient implementation of the algorithm. Assuming a at road and the complete set of acquisition parameters to be known (c...

2014
Mei Li Zhuolun Li Shan Ling Pan

Recent years, offshore outsourcing has received large amount of attention from both industry and academia because of its attractive advantages such as cost reduction, talent access. As an alternative way to implement information systems in operation management, offshore insourcing has been greatly overlooked. Though organizations shun from the contractual obligations in offshore insourcing, the...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه پیام نور - دانشگاه پیام نور استان تهران - دانشکده علوم انسانی 1390

this study attempted to explore if teaching english collocations through two different modes of awareness-raising and input flooding has any possible differential effect on immediate retention as well as retention in a delayed assessment. it also compared the possible differential effect of teaching english collocations implicitly and explicitly on actively using the items in writing. m...

2008
Bryan Ford Russ Cox

Code sandboxing is useful for many purposes, but most sandboxing techniques require kernel modifications, do not completely isolate guest code, or incur substantial performance costs. Vx32 is a multipurpose user-level sandbox that enables any application to load and safely execute one or more guest plug-ins, confining each guest to a system call API controlled by the host application and to a r...

2008
A. Loos D. Fey

Industrial manufacturing today requires both an efficient production process and an appropriate quality standard of each produced unit. The number of industrial vision applications, where real time vision systems are utilized, is continuously rising due to the increasing automation. Assembly lines, where component parts are manipulated by robot grippers, require a fast and fault tolerant visual...

Journal: :CoRR 2017
Sanchari Sen Shubham Jain Swagath Venkataramani Anand Raghunathan

Deep Neural Networks (DNNs) have emerged as the method of choice for solving a wide range of machine learning tasks. Satiating the enormous growth in computational demand posed by DNNs is a key challenge for computing system designers and has most commonly been addressed through the design of custom accelerators. However, these specialized accelerators that utilize large quantities of multiply-...

2004
Ethan Mirsky AndrC DeHon

MATRIX is a novel, coarse-grain, reconfigurable computing architecture which supports confgurable instruction distribution. Device resources are allocated to controlling and describing the computation on a per task basis. Application-specific regularity allows us to compress the resources allocated to instruction control and distribution, in many situations yielding more resources for datapaths...

Journal: :دانش و پژوهش در آموزش زبان انگلیسی 0
saeedeh shafee nahrkhalaji [email protected]

the necessity of conducting more studies addressing the development of pragmatic profciency and strong pragmatic awareness for english language learners has made the role of instruction and feedback in teaching pragmatic knowledge of utmost importance. the present study evaluates the relative effectiveness of four types of instruction for teaching some pragmatic markers including topic change m...

Journal: :IACR Cryptology ePrint Archive 2012
Jeremy Constantin Andreas Peter Burg Frank K. Gürkaynak

In this paper, we investigate the benefit of instruction set extensions for software implementations of all five SHA-3 candidates. To this end, we start from optimized assembly code for a common 16-bit microcontroller instruction set architecture. By themselves, these implementations provide reference for complexity of the algorithms on 16-bit architectures, commonly used in embedded systems. F...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید