This paper proposes an audio zero-watermarking algorithm based on Fast Fourier Transform (FFT).This algorithm does not change any contents about the audio signals. It proposes a solution about the contradictions about...
详细信息
In the article we evaluate different text representation methods used for a task of Wikipedia articles categorization. We present the Matrix'u application used for creating computational datasets of Wikipedia arti...
详细信息
Growing on-chip wire delays will cause many future microarchitecture to be distributed. The centralized control and data transmission of the conventional stream processor need to be improved, the hardware resources wi...
详细信息
With the explosive growth of data, hundreds of thousands of servers may be contained in a single data center. Hence, node failures are unavoidable and generally negatively effects the performance of the whole data cen...
详细信息
Dataflow predication provides a lightweight full support for predicated execution in dataflow-like architectures. One of its major overhead is the large amounts of fanout trees for distributing predicates to all depen...
详细信息
Generic instruction based testing methods do not always give good fault coverage for the complex units like Forwarding unit. Hence it becomes important to carefully craft the test which are best for different parts of...
详细信息
This paper presents a deeply pipelined and massively parallel Binary Search Tree (BST) accelerator for Field Programmable Gate Arrays (FPGAs). Our design relies on the extremely parallel on-chip memory, or Block RAMs ...
详细信息
Games with remote controls and motion sensors that require the players to move, so-called exergames, have become very popular. Many of these games are also being played by the senior population. Participating in regul...
详细信息
The Big Mac attack showed that an RSA implementation, protected with conventional side-channel countermeasures can be exploited on the basis of an operand sharing property of field multiplications with a single trace ...
详细信息
This paper proposed a model for user security management. This model can establish the blacklist and white list to achieve the control of the user subsequent actions through monitoring the changing of user trust level...
详细信息
暂无评论