Sciweavers

2786 search results - page 155 / 558
» A Practical Technique for Process Abstraction
Sort
View
ICICS
2009
Springer
15 years 8 months ago
Design of Reliable and Secure Multipliers by Multilinear Arithmetic Codes
Abstract. We propose an efficient technique for the detection of errors in cryptographic circuits introduced by strong adversaries. Previously a number of linear and nonlinear err...
Zhen Wang, Mark G. Karpovsky, Berk Sunar, Ajay Jos...
SIES
2008
IEEE
15 years 8 months ago
Dynamic voltage and frequency scaling for optimal real-time scheduling on multiprocessors
Abstract— Not only system performance but also energy efficiency is critically important for embedded systems. Optimal real-time scheduling is effective to not only schedulabili...
Kenji Funaoka, Akira Takeda, Shinpei Kato, Nobuyuk...
ICC
2007
IEEE
107views Communications» more  ICC 2007»
15 years 8 months ago
Error Floors of LDPC Coded BICM
Abstract— In recent years performance prediction for communication systems utilizing iteratively decodable codes has been of considerable interest. There have been significant b...
Aditya Ramamoorthy, Nedeljko Varnica
GD
2004
Springer
15 years 7 months ago
Graph Drawing by Stress Majorization
Abstract. One of the most popular graph drawing methods is based on achieving graph-theoretic target distances. This method was used by Kamada and Kawai [15], who formulated it as ...
Emden R. Gansner, Yehuda Koren, Stephen C. North
ACISP
2003
Springer
15 years 7 months ago
Robust Software Tokens - Yet Another Method for Securing User's Digital Identity
Abstract. This paper presents a robust software token that was developed to protect user’s digital identity by simple software-only techniques. This work is closely related to Ho...
Taekyoung Kwon