The SCEAS System
Navigation Menu

Conferences in DBLP

International Conference on Compilers, Architecture, and Synthesis for Embedded Systems (CASES) (cases)
2004 (conf/cases/2004)

  1. Kees A. Vissers
    Programming models and architectures for FPGA platforms. [Citation Graph (0, 0)][DBLP]
    CASES, 2004, pp:1- [Conf]
  2. Ali El-Haj-Mahmoud, Eric Rotenberg
    Safely exploiting multithreaded processors to tolerate memory latency in real-time systems. [Citation Graph (0, 0)][DBLP]
    CASES, 2004, pp:2-13 [Conf]
  3. Mahmut T. Kandemir, Ozcan Ozturk, Mustafa Karaköy
    Dynamic on-chip memory management for chip multiprocessors. [Citation Graph (0, 0)][DBLP]
    CASES, 2004, pp:14-23 [Conf]
  4. Ken W. Batcher, Robert A. Walker
    Cluster miss prediction with prefetch on miss for embedded CPU instruction caches. [Citation Graph (0, 0)][DBLP]
    CASES, 2004, pp:24-34 [Conf]
  5. Jayaprakash Pisharath, Alok N. Choudhary, Mahmut T. Kandemir
    Reducing energy consumption of queries in memory-resident database systems. [Citation Graph (0, 0)][DBLP]
    CASES, 2004, pp:35-45 [Conf]
  6. Binu K. Mathew, Al Davis, Michael Parker
    A low power architecture for embedded perception. [Citation Graph (0, 0)][DBLP]
    CASES, 2004, pp:46-56 [Conf]
  7. Timothy Sherwood, Mark Oskin, Brad Calder
    Balancing design options with Sherpa. [Citation Graph (0, 0)][DBLP]
    CASES, 2004, pp:57-68 [Conf]
  8. Pan Yu, Tulika Mitra
    Scalable custom instructions identification for instruction-set extensible processors. [Citation Graph (0, 0)][DBLP]
    CASES, 2004, pp:69-78 [Conf]
  9. Jesus Garcia, Mark G. Arnold, Leonidas L. Bleris, Mayuresh V. Kothare
    LNS architectures for embedded model predictive control processors. [Citation Graph (0, 0)][DBLP]
    CASES, 2004, pp:79-84 [Conf]
  10. Giovanni Beltrame, Gianluca Palermo, Donatella Sciuto, Cristina Silvano
    Plug-in of power models in the StepNP exploration platform: analysis of power/performance trade-offs. [Citation Graph (0, 0)][DBLP]
    CASES, 2004, pp:85-92 [Conf]
  11. Ravishankar Rao, Sarma B. K. Vrudhula, Musaravakkam S. Krishnan
    Disk drive energy optimization for audio-video applications. [Citation Graph (0, 0)][DBLP]
    CASES, 2004, pp:93-103 [Conf]
  12. Noel Eisley, Li-Shiuan Peh
    High-level power analysis for on-chip networks. [Citation Graph (0, 0)][DBLP]
    CASES, 2004, pp:104-115 [Conf]
  13. Shaoxiong Hua, Gang Qu
    Energy-efficient dual-voltage soft real-time system with (m, k)-firm deadline guarantee. [Citation Graph (0, 0)][DBLP]
    CASES, 2004, pp:116-123 [Conf]
  14. Bramha Allu, Wei Zhang 0002
    Static next sub-bank prediction for drowsy instruction cache. [Citation Graph (0, 0)][DBLP]
    CASES, 2004, pp:124-131 [Conf]
  15. Montserrat Ros, Peter Sutton
    A hamming distance based VLIW/EPIC code compression technique. [Citation Graph (0, 0)][DBLP]
    CASES, 2004, pp:132-139 [Conf]
  16. Linwei Niu, Gang Quan
    Reducing both dynamic and leakage energy consumption for hard real-time systems. [Citation Graph (0, 0)][DBLP]
    CASES, 2004, pp:140-148 [Conf]
  17. Wei Zhang 0002, Bramha Allu
    Loop-based leakage control for branch predictors. [Citation Graph (0, 0)][DBLP]
    CASES, 2004, pp:149-155 [Conf]
  18. John Cornish
    Balanced energy optimization. [Citation Graph (0, 0)][DBLP]
    CASES, 2004, pp:156- [Conf]
  19. Ramakrishnan Venkitaraman, Gopal Gupta
    Static program analysis of embedded executable assembly code. [Citation Graph (0, 0)][DBLP]
    CASES, 2004, pp:157-166 [Conf]
  20. Vasanth Asokan, Alexander G. Dean
    Providing time- and space- efficient procedure calls for asynchronous software thread integration. [Citation Graph (0, 0)][DBLP]
    CASES, 2004, pp:167-178 [Conf]
  21. Klaus Schneider, Jens Brandt, Tobias Schüle
    Causality analysis of synchronous programs with delayed actions. [Citation Graph (0, 0)][DBLP]
    CASES, 2004, pp:179-189 [Conf]
  22. Meilin Liu, Qingfeng Zhuge, Zili Shao, Edwin Hsing-Mean Sha
    General loop fusion technique for nested loops considering timing and code size. [Citation Graph (0, 0)][DBLP]
    CASES, 2004, pp:190-201 [Conf]
  23. David Berner, Jean-Pierre Talpin, Paul Le Guernic, Sandeep K. Shukla
    Modular design through component abstraction. [Citation Graph (0, 0)][DBLP]
    CASES, 2004, pp:202-211 [Conf]
  24. Valentina Salapura, Christos J. Georgiou, Indira Nair
    An efficient system-on-a-chip design methodology for networking applications. [Citation Graph (0, 0)][DBLP]
    CASES, 2004, pp:212-219 [Conf]
  25. Alexandru Turjan, Bart Kienhuis, Ed F. Deprettere
    Translating affine nested-loop programs to process networks. [Citation Graph (0, 0)][DBLP]
    CASES, 2004, pp:220-229 [Conf]
  26. Mary Kiemb, Kiyoung Choi
    Memory and architecture exploration with thread shifting for multithreaded processors in embedded systems. [Citation Graph (0, 0)][DBLP]
    CASES, 2004, pp:230-237 [Conf]
  27. Steve Carr, Philip H. Sweany
    Automatic data partitioning for the agere payload plus network processor. [Citation Graph (0, 0)][DBLP]
    CASES, 2004, pp:238-247 [Conf]
  28. Sven Verdoolaege, Rachid Seghir, Kristof Beyls, Vincent Loechner, Maurice Bruynooghe
    Analytical computation of Ehrhart polynomials: enabling more compiler analyses and optimizations. [Citation Graph (0, 0)][DBLP]
    CASES, 2004, pp:248-258 [Conf]
  29. Federico Angiolini, Francesco Menichelli, Alberto Ferrero, Luca Benini, Mauro Olivieri
    A post-compiler approach to scratchpad mapping of code. [Citation Graph (0, 0)][DBLP]
    CASES, 2004, pp:259-267 [Conf]
  30. Christophe Guillon, Fabrice Rastello, Thierry Bidault, Florent Bouchez
    Procedure placement using temporal-ordering information: dealing with code size expansion. [Citation Graph (0, 0)][DBLP]
    CASES, 2004, pp:268-279 [Conf]
  31. Surupa Biswas, Matthew Simpson, Rajeev Barua
    Memory overflow protection for embedded systems using run-time checks, reuse and compression. [Citation Graph (0, 0)][DBLP]
    CASES, 2004, pp:280-291 [Conf]
  32. Xiaotong Zhuang, Tao Zhang, Hsien-Hsin S. Lee, Santosh Pande
    Hardware assisted control flow obfuscation for embedded processors. [Citation Graph (0, 0)][DBLP]
    CASES, 2004, pp:292-302 [Conf]
  33. Yusuke Matsuoka, Patrick Schaumont, Kris Tiri, Ingrid Verbauwhede
    Java cryptography on KVM and its performance and security optimization using HW/SW co-design techniques. [Citation Graph (0, 0)][DBLP]
    CASES, 2004, pp:303-311 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002