Sciweavers

111 search results - page 9 / 23
» Effective Iterative Techniques for Fingerprinting Design IP
Sort
View
SIGMOD
2004
ACM
118views Database» more  SIGMOD 2004»
15 years 9 months ago
Effective Use of Block-Level Sampling in Statistics Estimation
Block-level sampling is far more efficient than true uniform-random sampling over a large database, but prone to significant errors if used to create database statistics. In this ...
Surajit Chaudhuri, Gautam Das, Utkarsh Srivastava
CCS
2006
ACM
15 years 1 months ago
Hot or not: revealing hidden services by their clock skew
Location-hidden services, as offered by anonymity systems such as Tor, allow servers to be operated under a pseudonym. As Tor is an overlay network, servers hosting hidden service...
Steven J. Murdoch
ISQED
2006
IEEE
259views Hardware» more  ISQED 2006»
15 years 3 months ago
Impact of NBTI on SRAM Read Stability and Design for Reliability
— Negative Bias Temperature Instability (NBTI) has the potential to become one of the main show-stoppers of circuit reliability in nanometer scale devices due to its deleterious ...
Sanjay V. Kumar, Chris H. Kim, Sachin S. Sapatneka...
ICCD
2004
IEEE
135views Hardware» more  ICCD 2004»
15 years 6 months ago
Design Methodologies and Architecture Solutions for High-Performance Interconnects
In Deep Sub-Micron (DSM) technologies, interconnects play a crucial role in the correct functionality and largely impact the performance of complex System-on-Chip (SoC) designs. F...
Davide Pandini, Cristiano Forzan, Livio Baldi
INFOCOM
2012
IEEE
13 years 23 hour ago
Truthful spectrum auction design for secondary networks
Abstract—Opportunistic wireless channel access by nonlicensed users has emerged as a promising solution for addressing the bandwidth scarcity challenge. Auctions represent a natu...
Yuefei Zhu, Baochun Li, Zongpeng Li