Zobrazeno 1 - 6
of 6
pro vyhledávání: '"Lucas Weaver"'
Autor:
Kedar Chitnis, Jesse Villarreal, Mihir Mody, Brijesh Jadav, Lucas Weaver, Taehun Kim, Shyam Jaganathan, Sujith Shivalingappa
Publikováno v:
2020 IEEE International Conference on Consumer Electronics - Asia (ICCE-Asia).
Due to end of Dennard Scaling, the latest chip architectures are multi-core, with each core customized for specific domains e.g. computer vision, deep learning, graphics, signal processing, image processing etc. However, software has not evolved to u
Publikováno v:
ASAP
OpenVX is a standardized, cross-platform software framework to aid in development of accelerated computer vision, machine learning, and other signal processing applications. Designed for performance optimization, OpenVX allows the programmer to defin
Publikováno v:
IVSW
Due to the increasing complexity of hardware designs, third-party hardware Intellectual Property (IP) cores are often incorporated to alleviate the burden on hardware designers. However, the prevalent use of third-party IPs has raised security concer
Autor:
Pedro A. Forero, Rajive Bagrodia, Jeffrey Weaver, Wei Liu, Terry Whelan, Lucas Weaver, Jose Chavez
Publikováno v:
2018 OCEANS - MTS/IEEE Kobe Techno-Oceans (OTO).
Advances in technology, systems, computation and storage have led to smaller, more capable underwater vessels with reduced capital and operating costs. Long-lived underwater hubs that can operate with minimal human intervention can be networked and d
Autor:
Brijesh Jadav, Pramod Kumar Swami, Victor Cheng, Kumar Desappan, Anshu Jain, Mihir Mody, Kedar Chitnis, Jesse Villarreal, Lucas Weaver
Publikováno v:
2017 IEEE International Conference on Consumer Electronics-Asia (ICCE-Asia).
Heterogeneous multi-core systems (CPU, GPU, HWA, DSP) are becoming the de-facto norm for multiple computer vision applications across automotive, robotics, AR/VR, and industrial machine vision. This creates a need for a software framework which reali
Publikováno v:
SoutheastCon 2016.
Inclusion of malicious logic (i.e., hardware Trojan) in 3rd party soft intellectual properties (IPs) has become a major concern in hardware security, since soft IPs are building blocks of larger hardware systems. Based on previous work of Structural