Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 43 matches
- 2006
- Neil C. Audsley, Michael Ward:
Syntax-driven implementation of software programming language control constructs and expressions on FPGAs. CASES 2006: 253-260 - Lan S. Bai, Lei Yang, Robert P. Dick:
Automated compile-time and run-time techniques to increase usable memory in MMU-less embedded systems. CASES 2006: 125-135 - Chinnakrishnan S. Ballapuram, Kiran Puttaswamy, Gabriel H. Loh, Hsien-Hsin S. Lee:
Entropy-based low power data TLB design. CASES 2006: 304-311 - Jason A. Blome, Shantanu Gupta, Shuguang Feng, Scott A. Mahlke:
Cost-efficient soft error protection for embedded microprocessors. CASES 2006: 421-431 - Paolo Bonzini, Laura Pozzi:
Code transformation strategies for extensible embedded processors. CASES 2006: 242-252 - Mats Brorsson, Mikael Collin:
Adaptive and flexible dictionary code compression for embedded applications. CASES 2006: 113-124 - Manuel Carro, José F. Morales, Henk L. Muller, Germán Puebla, Manuel V. Hermenegildo:
High-level languages for small devices: a case study. CASES 2006: 271-281 - John Cavazos, Christophe Dubach, Felix V. Agakov, Edwin V. Bonilla, Michael F. P. O'Boyle, Grigori Fursin, Olivier Temam:
Automatic performance model construction for the fast software exploration of new hardware designs. CASES 2006: 24-34 - Liang-Gee Chen:
Dances with multimedia: embedded video codec design. CASES 2006: 1 - Yoonseo Choi, Hwansoo Han:
Protected heap sharing for memory-constrained java environments. CASES 2006: 212-222 - Nathan Clark, Amir Hormati, Scott A. Mahlke, Sami Yehia:
Scalable subgraph mapping for acyclic computation accelerators. CASES 2006: 147-157 - Arran Derbyshire, Tobias Becker, Wayne Luk:
Incremental elaboration for run-time reconfigurable hardware designs. CASES 2006: 93-102 - Bernhard Egger, Chihun Kim, Choonki Jang, Yoonsung Nam, Jaejin Lee, Sang Lyul Min:
A dynamic code placement technique for scratchpad memory using postpass optimization. CASES 2006: 223-233 - Noel Eisley, Vassos Soteriou, Li-Shiuan Peh:
High-level power analysis for multi-core chips. CASES 2006: 389-400 - Jason George, Bo Marr, Bilge Saglam Akgul, Krishna V. Palem:
Probabilistic arithmetic and energy efficient embedded signal processing. CASES 2006: 158-168 - John Gilbert, David M. Abrahamson:
Adaptive object code compression. CASES 2006: 282-292 - Charles Hardnett, Krishna V. Palem, Yogesh Chobe:
Compiler optimization of embedded applications for an adaptive SoC architecture. CASES 2006: 312-322 - Kim M. Hazelwood, Artur Klauser:
A dynamic binary instrumentation engine for the ARM architecture. CASES 2006: 261-270 - Mark Hempstead, Gu-Yeon Wei, David M. Brooks:
Architecture and circuit techniques for low-throughput, energy-constrained systems across technology generations. CASES 2006: 368-378 - Stephen Hines, David B. Whalley, Gary S. Tyson:
Adapting compilation techniques to enhance the packing of instructions into registers. CASES 2006: 43-53 - Greg Hoover, Forrest Brewer, Timothy Sherwood:
Extensible control architectures. CASES 2006: 323-333 - Greg Hoover, Forrest Brewer, Timothy Sherwood:
A case study of multi-threading in the embedded space. CASES 2006: 357-367 - Dong-Heon Jung, Sung-Hwan Bae, Jaemok Lee, Soo-Mook Moon, Jong Kuk Park:
Supporting precise garbage collection in Java Bytecode-to-C ahead-of-time compiler for embedded systems. CASES 2006: 35-42 - Ka-Ming Keung, Akhilesh Tyagi:
State space reconfigurability: an implementation architecture for self modifying finite automata. CASES 2006: 83-92 - Taeho Kgil, Trevor N. Mudge:
FlashCache: a NAND flash memory file cache for low power web servers. CASES 2006: 103-112 - Kyoungwoo Lee, Aviral Shrivastava, Ilya Issenin, Nikil D. Dutt, Nalini Venkatasubramanian:
Mitigating soft error failures for multimedia applications by selective data protection. CASES 2006: 411-420 - Duo Liu, Bei Hua, Xianghui Hu, Xinan Tang:
High-performance packet classification algorithm for many-core and multithreaded network processor. CASES 2006: 334-344 - Hans-Peter Löb, Rainer Buchty, Wolfgang Karl:
A network agent for diagnosis and analysis of real-time Ethernet networks. CASES 2006: 65-73 - Hiroshi Nakashima, Masahiro Konishi, Takashi Nakada:
An accurate and efficient simulation-based analysis for worst case interruption delay. CASES 2006: 2-12 - Hyunchul Park, Kevin Fan, Manjunath Kudlur, Scott A. Mahlke:
Modulo graph embedding: mapping applications onto coarse-grained reconfigurable architectures. CASES 2006: 136-146
skipping 13 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-06 17:08 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint