Sciweavers

7189 search results - page 1297 / 1438
» Connecting Design with Code
Sort
View
139
Voted
FC
1997
Springer
86views Cryptology» more  FC 1997»
15 years 7 months ago
The SPEED Cipher
Abstract. SPEED is a private key block cipher. It supports three variable parameters: (1) data length — the length of a plaintext/ciphertext of SPEED can be 64, 128 or 256 bits. ...
Yuliang Zheng
135
Voted
EURODAC
1994
IEEE
127views VHDL» more  EURODAC 1994»
15 years 7 months ago
Optimal equivalent circuits for interconnect delay calculations using moments
In performance-driven interconnect design, delay estimators are used to determine both the topology and the layout of good routing trees. We address the class of moment-matching, ...
Sudhakar Muddu, Andrew B. Kahng
154
Voted
ICRA
1994
IEEE
236views Robotics» more  ICRA 1994»
15 years 7 months ago
Neptune: Above-Ground Storage Tank Inspection Robot System
act The Neptune system is a mobile robot system used to remotely inspect above-ground storage tanks (ASTs) while immersed in the petroleum product, in order to ascertain from the i...
Hagen Schempf
149
Voted
CASES
2006
ACM
15 years 7 months ago
Cost-efficient soft error protection for embedded microprocessors
Device scaling trends dramatically increase the susceptibility of microprocessors to soft errors. Further, mounting demand for embedded microprocessors in a wide array of safety c...
Jason A. Blome, Shantanu Gupta, Shuguang Feng, Sco...
139
Voted
FCCM
2004
IEEE
118views VLSI» more  FCCM 2004»
15 years 7 months ago
Virtual Memory Window for a Portable Reconfigurable Cryptography Coprocessor
Reconfigurable System-on-Chip (SoC) platforms that incorporate hard-core processors surrounded by large amounts of FPGA are today commodities: the reconfigurable logic is often us...
Miljan Vuletic, Laura Pozzi, Paolo Ienne
« Prev « First page 1297 / 1438 Last » Next »