Sciweavers

468 search results - page 90 / 94
» Cryptographic and Computational Challenges in Grid Computing
Sort
View
78
Voted
RECONFIG
2009
IEEE
172views VLSI» more  RECONFIG 2009»
15 years 4 months ago
Combined SCA and DFA Countermeasures Integrable in a FPGA Design Flow
Abstract—The main challenge when implementing cryptographic algorithms in hardware is to protect them against attacks that target directly the device. Two strategies are customar...
Shivam Bhasin, Jean-Luc Danger, Florent Flament, T...
ESAS
2004
Springer
15 years 2 months ago
Public Key Cryptography in Sensor Networks - Revisited
The common perception of public key cryptography is that it is complex, slow and power hungry, and as such not at all suitable for use in ultra-low power environments like wireless...
Gunnar Gaubatz, Jens-Peter Kaps, Berk Sunar
CCGRID
2008
IEEE
15 years 4 months ago
Using Dynamic Condor-Based Services for Classifying Schizophrenia in Diffusion Tensor Images
— Diffusion Tensor Imaging (DTI) provides insight into the white matter of the human brain, which is affected by Schizophrenia. By comparing a patient group to a control group, t...
Simon Caton, Matthan Caan, Sílvia Delgado O...
HPDC
2006
IEEE
15 years 3 months ago
Autonomic Adaptation of Virtual Distributed Environments in a Multi-Domain Infrastructure
By federating resources from multiple domains, a shared infrastructure provides aggregated computation resources to a large number of users. With rapid advances in virtualization ...
Dongyan Xu, Paul Ruth, Junghwan Rhee, Rick Kennell...
DAC
2010
ACM
15 years 1 months ago
A parallel integer programming approach to global routing
We propose a parallel global routing algorithm that concurrently processes routing subproblems corresponding to rectangular subregions covering the chip area. The algorithm uses a...
Tai-Hsuan Wu, Azadeh Davoodi, Jeffrey T. Linderoth