2017 IEEE 28th International Conference on Application-Specific Systems, Architectures and Processors (ASAP) 2017
DOI: 10.1109/asap.2017.7995262
|View full text |Cite
|
Sign up to set email alerts
|

Real-time object detection in software with custom vector instructions and algorithm changes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2018
2018
2018
2018

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 10 publications
0
1
0
Order By: Relevance
“…al utilized the custom instruction approach to protect cryptographic software implementations against Side Channel Attack (SCA) by emulating the behavior of the secure hardware circuits [5]. Similarly, custom instruction approach has also been used to efficiently implement the face detection algorithm [8] and S8 AES algorithm [1]. Viterbi algorithm has also been implemented in Xtensa [26] and in DLX [2] processors using custom instruction approach.…”
Section: Related Workmentioning
confidence: 99%
“…al utilized the custom instruction approach to protect cryptographic software implementations against Side Channel Attack (SCA) by emulating the behavior of the secure hardware circuits [5]. Similarly, custom instruction approach has also been used to efficiently implement the face detection algorithm [8] and S8 AES algorithm [1]. Viterbi algorithm has also been implemented in Xtensa [26] and in DLX [2] processors using custom instruction approach.…”
Section: Related Workmentioning
confidence: 99%