Sciweavers

339 search results - page 65 / 68
» An ADC-BiST scheme using sequential code analysis
Sort
View
93
Voted
CCS
2010
ACM
14 years 11 months ago
On the soundness of authenticate-then-encrypt: formalizing the malleability of symmetric encryption
A communication channel from an honest sender A to an honest receiver B can be described as a system with three interfaces labeled A, B, and E (the adversary), respectively, where...
Ueli Maurer, Björn Tackmann
SIGMETRICS
2003
ACM
199views Hardware» more  SIGMETRICS 2003»
15 years 4 months ago
Data cache locking for higher program predictability
Caches have become increasingly important with the widening gap between main memory and processor speeds. However, they are a source of unpredictability due to their characteristi...
Xavier Vera, Björn Lisper, Jingling Xue
CHI
2007
ACM
16 years 11 hour ago
Patterns of empathy in online communication
This article presents an investigation of empathy within an online community for older people (SeniorNet). Qualitative content analysis of 400 messages from a discussion board abo...
Ulrike Pfeil, Panayiotis Zaphiris
CVPR
2010
IEEE
15 years 1 months ago
Compact Projection: Simple and Efficient Near Neighbor Search with Practical Memory Requirements
Image similarity search is a fundamental problem in computer vision. Efficient similarity search across large image databases depends critically on the availability of compact ima...
Kerui Min, Linjun Yang, John Wright, Lei Wu, Xian-...
FPGA
2008
ACM
623views FPGA» more  FPGA 2008»
15 years 1 months ago
From the bitstream to the netlist
We present an in-depth analysis of the Xilinx bitstream format. The information gathered in this paper allows bitstream compilation and decompilation. While not actually compromis...
Jean-Baptiste Note, Éric Rannaud