Sciweavers

2129 search results - page 170 / 426
» Cutting-Edge Timing Analysis Techniques
Sort
View
ETS
2011
IEEE
224views Hardware» more  ETS 2011»
13 years 10 months ago
AVF Analysis Acceleration via Hierarchical Fault Pruning
—The notion of Architectural Vulnerability Factor (AVF) has been extensively used by designers to evaluate various aspects of design robustness. While AVF is a very accurate way ...
Michail Maniatakos, Chandra Tirumurti, Abhijit Jas...
FDTC
2009
Springer
189views Cryptology» more  FDTC 2009»
15 years 4 months ago
KeeLoq and Side-Channel Analysis-Evolution of an Attack
—Last year we were able to break KeeLoq, which is a 64 bit block cipher that is popular for remote keyless entry (RKE) systems. KeeLoq RKEs are widely used for access control pur...
Christof Paar, Thomas Eisenbarth, Markus Kasper, T...
CHI
2009
ACM
15 years 10 months ago
Using temporal patterns (t-patterns) to derive stress factors of routine tasks
We describe the use of a statistical technique called Tpattern analysis to derive and characterize the routineness of tasks. T-patterns provide significant advantages over traditi...
Oliver Brdiczka, Norman Makoto Su, Bo Begole
CORR
2010
Springer
99views Education» more  CORR 2010»
14 years 10 months ago
MIMO Identical Eigenmode Transmission System (IETS) - A Channel Decomposition Perspective
In the past few years considerable attention has been given to the design of multiple-input multiple-output (MIMO) eigenmode transmission systems (EMTS). This paper presents an in...
M. Zeeshan Shakir, Tariq S. Durrani
POPL
2008
ACM
15 years 10 months ago
Demand-driven alias analysis for C
This paper presents a demand-driven, flow-insensitive analysis algorithm for answering may-alias queries. We formulate the computation of alias queries as a CFL-reachability probl...
Xin Zheng, Radu Rugina