Sciweavers

3134 search results - page 333 / 627
» Computing full disjunctions
Sort
View
115
Voted
RECONFIG
2009
IEEE
118views VLSI» more  RECONFIG 2009»
15 years 7 months ago
Protecting the NOEKEON Cipher against SCARE Attacks in FPGAs by Using Dynamic Implementations
Abstract. Protecting an implementation against Side Channel Analysis for Reverse Engineering (SCARE) attacks is a great challenge and we address this challenge by presenting a fir...
Julien Bringer, Hervé Chabanne, Jean-Luc Da...
114
Voted
ICRA
2009
IEEE
139views Robotics» more  ICRA 2009»
15 years 7 months ago
Laser-based navigation enhanced with 3D time-of-flight data
— Navigation and obstacle avoidance in robotics using planar laser scans has matured over the last decades. They basically enable robots to penetrate highly dynamic and populated...
Fang Yuan, Agnes Swadzba, Roland Philippsen, Orhan...
IEEEPACT
2009
IEEE
15 years 7 months ago
Chainsaw: Using Binary Matching for Relative Instruction Mix Comparison
With advances in hardware, instruction set architectures are undergoing continual evolution. As a result, compilers are under constant pressure to adapt and take full advantage of...
Tipp Moseley, Dirk Grunwald, Ramesh Peri
ISDA
2009
IEEE
15 years 7 months ago
GPU-Based Road Sign Detection Using Particle Swarm Optimization
—Road Sign Detection is a major goal of Advanced Driving Assistance Systems (ADAS). Since the dawn of this discipline, much work based on different techniques has been published ...
Luca Mussi, Stefano Cagnoni, Fabio Daolio
98
Voted
ISORC
2009
IEEE
15 years 7 months ago
From Requirements to Code Revisited
In his article entitled "From Play-In Scenarios to Code: An Achievable Dream", David Harel presented a development schema that makes it possible to go from high-level us...
Tewfik Ziadi, Xavier Blanc, Amine Raji