Sciweavers

482 search results - page 66 / 97
» A bitmask-based code compression technique for embedded syst...
Sort
View
97
Voted
CODES
2000
IEEE
15 years 4 months ago
Co-design of interleaved memory systems
Memory interleaving is a cost-efficient approach to increase bandwidth. Improving data access locality and reducing memory access conflicts are two important aspects to achieve hi...
Hua Lin, Wayne Wolf
CTRSA
2010
Springer
152views Cryptology» more  CTRSA 2010»
15 years 3 months ago
Differential Cache-Collision Timing Attacks on AES with Applications to Embedded CPUs
This paper proposes a new type of cache-collision timing attacks on software implementations of AES. Our major technique is of differential nature and is based on the internal cryp...
Andrey Bogdanov, Thomas Eisenbarth, Christof Paar,...
105
Voted
TIP
2002
114views more  TIP 2002»
15 years 3 days ago
Lossy to lossless object-based coding of 3-D MRI data
Abstract--We propose a fully three-dimensional (3-D) object-based coding system exploiting the diagnostic relevance of the different regions of the volumetric data for rate allocat...
Gloria Menegaz, Jean-Philippe Thiran
140
Voted
CSREAESA
2008
15 years 1 months ago
BIST-BASED Group Testing for Diagnosis of Embedded FPGA Cores
A group testing-based BIST technique to identify faulty hard cores in FPGA devices is presented. The method provides for isolation of faults in embedded cores as demonstrated by ex...
Alireza Sarvi, Carthik A. Sharma, Ronald F. DeMara
110
Voted
ICASSP
2010
IEEE
14 years 10 months ago
Towards objectifying information hiding
In this paper, the concept of object-oriented embedding (OOE) is introduced into information hiding in general and particularly to steganography which is the science that involves...
Abbas Cheddad, Joan Condell, Kevin Curran, Paul Mc...