Sciweavers

61 search results - page 3 / 13
» Tradeoffs in the Complexity of Backdoor Detection
Sort
View
ASPLOS
2006
ACM
13 years 11 months ago
Tradeoffs in transactional memory virtualization
For transactional memory (TM) to achieve widespread acceptance, transactions should not be limited to the physical resources of any specific hardware implementation. TM systems s...
JaeWoong Chung, Chi Cao Minh, Austen McDonald, Tra...
VTC
2010
IEEE
140views Communications» more  VTC 2010»
13 years 3 months ago
Iterative Soft-In Soft-Out Sphere Detection for 3GPP LTE
—3GPP LTE has become a hot topic in recent years. One of its main challenges is the computationally intense task of MIMO detection. This paper investigates MIMO detection methods...
Mohammad Ali Shah, Björn Mennenga, Gerhard Fe...
TIT
2010
124views Education» more  TIT 2010»
13 years 3 hour ago
Soft-input soft-output single tree-search sphere decoding
Soft-input soft-output (SISO) detection algorithms form the basis for iterative decoding. The computational complexity of SISO detection often poses significant challenges for prac...
Christoph Studer, Helmut Bölcskei
GLOBECOM
2008
IEEE
13 years 11 months ago
Near-Capacity Three-Stage Downlink Iteratively Decoded Generalized Layered Space-Time Coding with Low Complexity
Abstract— This paper presents a low complexity iteratively detected space-time transmission architecture based on Generalized Layered Space-Time (GLST) codes and IRregular Convol...
Lingkun Kong, Soon Xin Ng, Lajos Hanzo
NSDI
2008
13 years 7 months ago
Designing and Implementing Malicious Hardware
Hidden malicious circuits provide an attacker with a stealthy attack vector. As they occupy a layer below the entire software stack, malicious circuits can bypass traditional defe...
Samuel T. King, Joseph Tucek, Anthony Cozzie, Chri...