Sciweavers

6318 search results - page 34 / 1264
» Data Leakage Detection
Sort
View
GFKL
2007
Springer
119views Data Mining» more  GFKL 2007»
15 years 1 months ago
New Issues in Near-duplicate Detection
Martin Potthast, Benno Stein
ISQED
2008
IEEE
120views Hardware» more  ISQED 2008»
15 years 4 months ago
Error-Tolerant SRAM Design for Ultra-Low Power Standby Operation
We present an error-tolerant SRAM design optimized for ultra-low standby power. Using SRAM cell optimization techniques, the maximum data retention voltage (DRV) of a 90nm 26kb SR...
Huifang Qin, Animesh Kumar, Kannan Ramchandran, Ja...
SOCC
2008
IEEE
106views Education» more  SOCC 2008»
15 years 4 months ago
A robust ultra-low power asynchronous FIFO memory with self-adaptive power control
First-in first-out (FIFO) memories are widely used in SoC for data buffering and flow control. In this paper, a robust ultra-low power asynchronous FIFO memory is proposed. With s...
Mu-Tien Chang, Po-Tsang Huang, Wei Hwang
DFT
2003
IEEE
86views VLSI» more  DFT 2003»
15 years 3 months ago
CROWNE: Current Ratio Outliers with Neighbor Estimator
Increased leakage and process variations make distinction between fault-free and faulty chips by IDDQ test difficult. Earlier the concept of Current Ratios (CR) was proposed to sc...
Sagar S. Sabade, D. M. H. Walker
EDBT
2010
ACM
180views Database» more  EDBT 2010»
15 years 1 months ago
k-symmetry model for identity anonymization in social networks
With more and more social network data being released, protecting the sensitive information within social networks from leakage has become an important concern of publishers. Adve...
Wentao Wu, Yanghua Xiao, Wei Wang, Zhenying He, Zh...