Sciweavers

339 search results - page 27 / 68
» An ADC-BiST scheme using sequential code analysis
Sort
View
APLAS
2007
ACM
15 years 9 months ago
More Typed Assembly Languages for Confidentiality
We propose a series of type systems for the information-flow security of assembly code. These systems extend previous work TALC with some timing annotations and associated judgment...
Dachuan Yu
IJPP
2011
107views more  IJPP 2011»
14 years 11 months ago
Parallel Iterator for Parallelizing Object-Oriented Applications
With the advent of multi-core processors, desktop application developers must finally face parallel computing and its challenges. A large portion of the computational load in a p...
Nasser Giacaman, Oliver Sinnen
CARDIS
2004
Springer
216views Hardware» more  CARDIS 2004»
15 years 10 months ago
Differential Fault Analysis Attack Resistant Architectures for the Advanced Encryption Standard
: We present two architectures for protecting a hardware implementation of AES against side-channel attacks known as Differential Fault Analysis attacks. The first architecture, wh...
Mark G. Karpovsky, Konrad J. Kulikowski, Alexander...
PR
2008
146views more  PR 2008»
15 years 5 months ago
Retrieval of machine-printed Latin documents through Word Shape Coding
This paper reports a document retrieval technique that retrieves machine-printed Latin-based document images through word shape coding. Adopting the idea of image annotation, a wo...
Shijian Lu, Chew Lim Tan
VTC
2007
IEEE
15 years 11 months ago
A NETwork COding based Multicasting (NETCOM) over IEEE 802.11 Multi-hop
— In this paper, we present an analysis of various multicast schemes over IEEE 802.11 Multi-hop. Analyzing performance of wireless multicasting communication is important because...
Yong Ho Kim, Nan Sol Seo, Young Yong Kim