Efficient m-Ary Balanced Codes which Are Invariant under Symbol Permutation
A symbol permutation invariant balanced (SPI-balanced) code over the alphabet {\hbox{\rlap{Z}\kern 2.0pt{\hbox{Z}}}}_m=\{0,1,\ldots,m-1\} is a block code over {\hbox{\rlap{Z}\kern 2.0pt{\hbox{Z}}}}_m such that each alphabet symbol occurs as many times ...
DPPC-RE: TCAM-Based Distributed Parallel Packet Classification with Range Encoding
Packet classification has been a critical data path function for many emerging networking applications. An interesting approach is the use of Ternary Content Addressable Memory (TCAM) to achieve deterministic, high-speed packet classification ...
Design Trade-Offs for User-Level I/O Architectures
To address the growing I/O bottleneck, next-generation distributed I/O architectures employ scalable point-to-point interconnects and minimize operating system overhead by providing user-level access to the I/O subsystem. Reduced I/O overhead allows I/O ...
Software Multiplication Using Gaussian Normal Bases
Fast algorithms for multiplication in finite fields are required for several cryptographic applications, in particular for implementing elliptic curve operations over binary fields {\hbox{\rlap{I}\kern 2.0pt{\hbox{F}}}}_{2^m}. In this paper, we present ...
Minimizing Sum of Completion Times and Makespan in Master-Slave Systems
We consider scheduling problems in the master-slave model. In this model, each job has to be processed sequentially in three stages. In the first stage, a preprocessing task runs on a master machine, in the second stage, a slave task runs on a dedicated ...
Pipelined Computation of Scalar Multiplication in Elliptic Curve Cryptosystems (Extended Version)
In the current work, we propose a pipelining scheme for implementing Elliptic Curve Cryptosystems (ECC). The scalar multiplication is the dominant operation in ECC. It is computed by a series of point additions and doublings. The pipelining scheme is ...
Simultaneous Interconnect Delay and Crosstalk Noise Optimization through Gate Sizing Using Game Theory
The continuous scaling trends of interconnect wires in deep submicron (DSM) circuits result in increased interconnect delay and crosstalk noise. In this work, we develop a new postlayout gate sizing algorithm for simultaneous optimization of ...
An Effective Visibility Culling Method Based on Cache Block
As the complexity of 3D scenes is on the increase, the search for an effective visibility culling method has become one of the most important issues to be addressed in the design of 3D rendering processors. In this paper, we propose a new rasterization ...
Self-Organizing Sensor Networks for Integrated Target Surveillance
Self-organization is critical for a distributed wireless sensor network due to the spontaneous and random deployment of a large number of sensor nodes over a remote area. Such a network is often characterized by its abilities to form an organizational ...
An Online Heuristic for Maximum Lifetime Routing in Wireless Sensor Networks
We show that the problem of routing messages in a wireless sensor network so as to maximize network lifetime is NP-hard. In our model, the online model, each message has to be routed without knowledge of future route requests. We also develop an online ...
Using Indexing Functions to Reduce Conflict Aliasing in Branch Prediction Tables
High-accuracy branch prediction is crucial for high-performance processors. Inspired by the work on indexing functions to eliminate conflict-misses in memory hierarchy, this paper explores different indexing approaches to reduce conflict aliasing in ...
Integer Multipliers with Overflow Detection
This paper presents a general approach for designing array and tree integer multipliers with overflow detection. The overflow detection techniques are based on an analysis of the magnitudes of the input operands. The overflow detection circuits operate ...
A Comment on "Boolean Functions Classification via Fixed Polarity Reed-Muller Form'
A correction to the classification of the space of n{\hbox{-}}{\rm variable} Boolean functions proposed in the paper cited in [1] is reported here and commented upon.