Sciweavers

3116 search results - page 60 / 624
» Design and implementation of network puzzles
Sort
View
DATE
2005
IEEE
109views Hardware» more  DATE 2005»
15 years 5 months ago
Design Method for Constant Power Consumption of Differential Logic Circuits
Side channel attacks are a major security concern for smart cards and other embedded devices. They analyze the variations on the power consumption to find the secret key of the en...
Kris Tiri, Ingrid Verbauwhede
NETWORKS
2007
14 years 11 months ago
Tailoring neighborhood search for the internet protocol network design problem with reliability and routing constraints
The Internet Protocol Network Design Problem with Reliability and Routing Constraints (IPRR) can be shortly stated as follows. A telecommunication network is given in terms of a s...
Luigi De Giovanni, Roberto Tadei
IPPS
2008
IEEE
15 years 6 months ago
Design and optimization of a distributed, embedded speech recognition system
In this paper, we present the design and implementation of a distributed sensor network application for embedded, isolated-word, real-time speech recognition. In our system design...
Chung-Ching Shen, William Plishker, Shuvra S. Bhat...
CCS
2004
ACM
15 years 5 months ago
IP covert timing channels: design and detection
A network covert channel is a mechanism that can be used to leak information across a network in violation of a security policy and in a manner that can be difficult to detect. In...
Serdar Cabuk, Carla E. Brodley, Clay Shields
DAC
1996
ACM
15 years 4 months ago
A System Design Methodology for Software/Hardware Co-Development of Telecommunication Network Applications
In this paper, we describe a system design methodology for the concurrent development of hybrid software/hardware systems for telecom network applications. This methodology is bas...
Bill Lin