Sciweavers

30 search results - page 2 / 6
» Efficient hardware checkpointing: concepts, overhead analysi...
Sort
View
DATE
2003
IEEE
99views Hardware» more  DATE 2003»
13 years 11 months ago
RF-BIST: Loopback Spectral Signature Analysis
Built-In Self-Test (BIST) becomes important also for more complex structures like complete front-ends. In order to bring down the costs for the test overhead, Spectral Signature A...
Doris Lupea, Udo Pursche, Hans-Joachim Jentschel
CC
2006
Springer
118views System Software» more  CC 2006»
13 years 9 months ago
Lightweight Lexical Closures for Legitimate Execution Stack Access
We propose a new language concept called "L-closures" for a running program to legitimately inspect/modify the contents of its execution stack. L-closures are lightweight...
Masahiro Yasugi, Tasuku Hiraishi, Taiichi Yuasa
MICRO
2008
IEEE
118views Hardware» more  MICRO 2008»
14 years 1 days ago
Notary: Hardware techniques to enhance signatures
Hardware signatures have been recently proposed as an efficient mechanism to detect conflicts amongst concurrently running transactions in transactional memory systems (e.g., Bulk...
Luke Yen, Stark C. Draper, Mark D. Hill
CIMAGING
2009
94views Hardware» more  CIMAGING 2009»
13 years 3 months ago
Iterative demosaicking accelerated: theory and fast noniterative implementations
Color image demosaicking is a key process in the digital imaging pipeline. In this paper, we present a rigorous treatment of a classical demosaicking algorithm based on alternatin...
Yue M. Lu, Mina Karzand, Martin Vetterli
CARDIS
2004
Springer
216views Hardware» more  CARDIS 2004»
13 years 11 months ago
Differential Fault Analysis Attack Resistant Architectures for the Advanced Encryption Standard
: We present two architectures for protecting a hardware implementation of AES against side-channel attacks known as Differential Fault Analysis attacks. The first architecture, wh...
Mark G. Karpovsky, Konrad J. Kulikowski, Alexander...