Sciweavers

1010 search results - page 80 / 202
» Designing Then and Now
Sort
View
FPGA
2006
ACM
178views FPGA» more  FPGA 2006»
15 years 2 months ago
Application-specific customization of soft processor microarchitecture
A key advantage of soft processors (processors built on an FPGA programmable fabric) over hard processors is that they can be customized to suit an application program's spec...
Peter Yiannacouras, J. Gregory Steffan, Jonathan R...
TKDE
2008
123views more  TKDE 2008»
14 years 11 months ago
DiSC: Benchmarking Secure Chip DBMS
Secure chips, e.g., present in smart cards, USB dongles, i-buttons, are now ubiquitous in applications with strong security requirements. Moreover, they require embedded data manag...
Nicolas Anciaux, Luc Bouganim, Philippe Pucheral, ...
CHES
2009
Springer
265views Cryptology» more  CHES 2009»
15 years 11 months ago
Higher-Order Masking and Shuffling for Software Implementations of Block Ciphers
Differential Power Analysis (DPA) is a powerful side channel key recovery attack that efficiently breaks block ciphers implementations. In software, two main techniques are usually...
Matthieu Rivain, Emmanuel Prouff, Julien Doget
APCHI
2004
IEEE
15 years 2 months ago
Nine Tools for Generating Harmonious Colour Schemes
We survey a number of tools that have been developed for generating sets of colours according to commonly accepted rules for colour harmony. Informal manual techniques for generati...
Paul J. Lyons, Giovanni S. Moretti
SOSP
1993
ACM
15 years 15 days ago
Handling Audio and Video Streams in a Distributed Environment
Handling audio and video in a digital environment requires timely delivery of data. This paper describes the principles adopted in the design of the Pandora networked multi-media ...
Alan Jones, Andrew Hopper