Sciweavers

26496 search results - page 5121 / 5300
» An Approach to Computing Ethics
Sort
View
VMCAI
2009
Springer
15 years 5 months ago
A Scalable Memory Model for Low-Level Code
Abstract. Because of its critical importance underlying all other software, lowlevel system software is among the most important targets for formal verification. Low-level systems...
Zvonimir Rakamaric, Alan J. Hu
DATE
2009
IEEE
114views Hardware» more  DATE 2009»
15 years 5 months ago
Hardware aging-based software metering
Abstract—Reliable and verifiable hardware, software and content usage metering (HSCM) are of primary importance for wide segments of e-commerce including intellectual property a...
Foad Dabiri, Miodrag Potkonjak
92
Voted
DATE
2009
IEEE
125views Hardware» more  DATE 2009»
15 years 5 months ago
On linewidth-based yield analysis for nanometer lithography
— Lithographic variability and its impact on printability is a major concern in today’s semiconductor manufacturing process. To address sub-wavelength printability, a number of...
Aswin Sreedhar, Sandip Kundu
GLOBECOM
2009
IEEE
15 years 5 months ago
Hierarchical Network Formation Games in the Uplink of Multi-Hop Wireless Networks
— In this paper, we propose a game theoretic approach to tackle the problem of the distributed formation of the hierarchical network architecture that connects the nodes in the u...
Walid Saad, Quanyan Zhu, Tamer Basar, Zhu Han, Are...
RECONFIG
2009
IEEE
172views VLSI» more  RECONFIG 2009»
15 years 5 months ago
Combined SCA and DFA Countermeasures Integrable in a FPGA Design Flow
Abstract—The main challenge when implementing cryptographic algorithms in hardware is to protect them against attacks that target directly the device. Two strategies are customar...
Shivam Bhasin, Jean-Luc Danger, Florent Flament, T...
« Prev « First page 5121 / 5300 Last » Next »