Zobrazeno 1 - 9
of 9
pro vyhledávání: '"Jaeyung Jun"'
Autor:
Seokhyun Ryu, Sohyun Kim, Jaeyung Jun, Donguk Moon, Kyungsoo Lee, Jungmin Choi, Sunwoong Kim, Hyungsoo Kim, Luke Kim, Won Ha Choi, Moohyeon Nam, Dooyoung Hwang, Hongchan Roh, Youngpyo Joo
Publikováno v:
2023 IEEE International Conference on Big Data and Smart Computing (BigComp).
Publikováno v:
IEEE Transactions on Consumer Electronics. 65:322-328
In recent years, new emerging display-based consumer products, such as augmented and virtual reality headsets and automotive video systems have required higher communication bandwidth due to higher bits per pixel and refresh rates. Thus, many video c
Publikováno v:
ACM Transactions on Design Automation of Electronic Systems. 24:1-31
As the device capacity of Dynamic Random Access Memory (DRAM) increases, refresh operation becomes a significant contributory factor toward total power consumption and memory throughput of the device. To reduce the problems associated with the refres
Publikováno v:
ACM Transactions on Design Automation of Electronic Systems. 24:1-25
As dynamic random access memory (DRAM) cells continue to be scaled down for higher density and capacity, they have more faults. Thus, DRAM reliability becomes a major concern in computer systems. Previous studies have proposed many techniques preserv
Publikováno v:
ACM Transactions on Design Automation of Electronic Systems. 23:1-21
Recently, scaling down dynamic random access memory (DRAM) has become more of a challenge, with more faults than before and a significant degradation in yield. To improve the yield in DRAM, a redundancy repair technique with intra-subarray replacemen
Publikováno v:
Microprocessors and Microsystems. 47:360-368
In spite of many outstanding studies, the hardware implementation of Advanced Encryption Standard (AES) algorithm is still challenging because of recurrent computations in Galois Field GF(28). In this paper, in order to revolution up the hardware imp
Publikováno v:
Electronics
Volume 9
Issue 5
Electronics, Vol 9, Iss 820, p 820 (2020)
Volume 9
Issue 5
Electronics, Vol 9, Iss 820, p 820 (2020)
The fetched instructions would have data dependency with in-flight ones in the pipeline execution of a processor, so the dependency prevents the processor from executing the incoming instructions for guaranteeing the program&rsquo
s correctness.
s correctness.
Publikováno v:
Journal of Korea Multimedia Society. 18:1547-1554
Because there are numerous near field communication (NFC) technical standards and each standard has an independent communication protocol, an NFC software for controlling the protocols are significantly complicated. Especially, the anticollision algo
Publikováno v:
IEIE Transactions on Smart Processing and Computing. 4:366-370
This paper proposes a method for improving a branch predictor for the extendable instruction set computer (EISC) processor. The original EISC branch predictor has several shortcomings: a small branch target buffer, absence of a global history, a one-