Sciweavers

8655 search results - page 498 / 1731
» Challenges for Trusted Computing
Sort
View
AFRICACRYPT
2010
Springer
15 years 11 months ago
ECC2K-130 on Cell CPUs
This paper describes an implementation of Pollard’s rho algorithm to compute the elliptic curve discrete logarithm for the Synergistic Processor Elements of the Cell Broadband En...
Joppe W. Bos, Thorsten Kleinjung, Ruben Niederhage...
ISQED
2009
IEEE
112views Hardware» more  ISQED 2009»
15 years 11 months ago
Estimation and optimization of reliability of noisy digital circuits
— With continued scaling, reliability is emerging as a critical challenge for the designers of digital circuits. The challenge stems in part from the lack of computationally ef...
Satish Sivaswamy, Kia Bazargan, Marc D. Riedel
PERCOM
2009
ACM
15 years 11 months ago
Privacy-Preserving Event Detection in Pervasive Spaces
Abstract—In this paper, we consider privacy challenges in eventdriven pervasive spaces where multimedia streams captured by sensors embedded in the infrastructure are used to det...
Bijit Hore, Jehan Wickramasuriya, Sharad Mehrotra,...
CAV
2009
Springer
156views Hardware» more  CAV 2009»
15 years 11 months ago
Towards Performance Prediction of Compositional Models in Industrial GALS Designs
Systems and Networks on Chips (NoCs) are a prime design focus of many hardware manufacturers. In addition to functional verification, which is a difficult necessity, the chip desi...
Nicolas Coste, Holger Hermanns, Etienne Lantreibec...
ICB
2009
Springer
190views Biometrics» more  ICB 2009»
15 years 11 months ago
Robust Human Detection under Occlusion by Integrating Face and Person Detectors
Human detection under occlusion is a challenging problem in computer vision. We address this problem through a framework which integrates face detection and person detection. We ...
William Robson Schwartz, Raghuraman Gopalan, Rama ...