5 | -- | 0 | Pradip Bose. Communication versus Computation |
6 | -- | 0 | Richard H. Stern. Vicarious liability for infringement |
7 | -- | 9 | Ioannis Papaefstathiou, Nikos A. Nikolaou, Bharat T. Doshi, Eric Grosse. Guest Editors Introduction: Network Processors for Future High-End Systems and Applications |
10 | -- | 18 | Jakob Carlström, Thomas Boden. Synchronous Dataflow Architecture for Network Processors |
20 | -- | 33 | Ioannis Papaefstathiou, Stylianos Perissakis, Theofanis Orphanoudakis, Nikos A. Nikolaou, George Kornaros, Nicholas Zervos, George E. Konstantoulakis, Dionisios N. Pnevmatikatos, Kyriakos Vlachos. PRO3: A Hybrid NPU Architecture |
34 | -- | 44 | Yan Luo, Jun Yang, Laxmi N. Bhuyan, Li Zhao. NePSim: A Network Processor Simulator with a Power Evaluation Framework |
45 | -- | 54 | Niraj Shah, William Plishker, Kaushik Ravindran, Kurt Keutzer. NP-Click: A Productive Software Development Approach for Network Processors |
55 | -- | 69 | Zhangxi Tan, Chuang Lin, Hao Yin, Bo Li. Optimization and Benchmark of Cryptographic Algorithms on Network Processors |
70 | -- | 78 | Taeweon Suh, Hsien-Hsin S. Lee, Douglas M. Blough. Integrating Cache Coherence Protocols for Heterogeneous Multiprocessor Systems, Part 2 |
83 | -- | 85 | Shane Greenstein. Creative Destruction and Deconstruction |
86 | -- | 88 | Richard Mateosian. Seek and Show |