Sciweavers

2945 search results - page 20 / 589
» Designing and Implementing Malicious Hardware
Sort
View
CCS
2009
ACM
15 years 6 months ago
Physically restricted authentication with trusted hardware
Modern computer systems permit users to access protected information from remote locations. In certain secure environments, it would be desirable to restrict this access to a part...
Michael S. Kirkpatrick, Elisa Bertino
RSP
2000
IEEE
143views Control Systems» more  RSP 2000»
15 years 4 months ago
Hardware/Software Co-Design of a Java Virtual Machine
This paper discusses the initial results of research into the development of a hardware/software co-design of the Java virtual machine. The design considers a complete Java virtua...
Kenneth B. Kent, Micaela Serra
IRI
2007
IEEE
15 years 6 months ago
Reuse Technique in Hardware Design
The paper presents a technique for the design of digital systems on the basis of reusable hardware templates, which are circuits with modifiable functionality that might be custom...
Valery Sklyarov, Iouliia Skliarova
FPL
2006
Springer
135views Hardware» more  FPL 2006»
15 years 3 months ago
FPGA Design Considerations in the Implementation of a Fixed-Throughput Sphere Decoder for MIMO Systems
A field-programmable gate array (FPGA) implementation of a new detection algorithm for uncoded multiple inputmultiple output (MIMO) systems based on the complex version of the sph...
Luis G. Barbero, John S. Thompson
DATE
2005
IEEE
192views Hardware» more  DATE 2005»
15 years 5 months ago
C Based Hardware Design for Wireless Applications
The algorithms used in wireless applications are increasingly more sophisticated and consequently more challenging to implement in hardware. Traditional design flows require devel...
Andrés Takach, Bryan Bowyer, Thomas Bollaer...