Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering

Clemson University

2011

FPGA

Articles 1 - 2 of 2

Full-Text Articles in Engineering

Accelerating Pattern Recognition Algorithms On Parallel Computing Architectures, Kenneth Rice Dec 2011

Accelerating Pattern Recognition Algorithms On Parallel Computing Architectures, Kenneth Rice

All Dissertations

The move to more parallel computing architectures places more responsibility on the programmer to achieve greater performance. The programmer must now have a greater understanding of the underlying architecture and the inherent algorithmic parallelism. Using parallel computing architectures for exploiting algorithmic parallelism can be a complex task. This dissertation demonstrates various techniques for using parallel computing architectures to exploit algorithmic parallelism. Specifically, three pattern recognition (PR) approaches are examined for acceleration across multiple parallel computing architectures, namely field programmable gate arrays (FPGAs) and general purpose graphical processing units (GPGPUs).
Phase-only filter correlation for fingerprint identification was studied as the first …


Towards Securing Virtualization Using A Reconfigurable Platform, Tushar Janefalkar May 2011

Towards Securing Virtualization Using A Reconfigurable Platform, Tushar Janefalkar

All Theses

Virtualization is no longer limited to main stream processors and servers. Virtualization software for General Purpose Processors (GPP) that allow one Operating System (OS) to run as an application in another OS have become commonplace. To exploit the full potential of the available hardware, virtualization is now prevalent across all systems big and small. Besides GPPs, state-of-the-art embedded processors are now capable of running rich operating systems and their virtualization is now a hot topic of research. However, this technological progress also opens doors for attackers to snoop on data that is not only confined to storage servers but also …