Sciweavers

1957 search results - page 160 / 392
» Embedded Processor Security
Sort
View
126
Voted
DATE
2008
IEEE
102views Hardware» more  DATE 2008»
15 years 11 months ago
Vectorization of Reed Solomon Decoding and Mapping on the EVP
Reed Solomon (RS) codes are used in a variety of (wireless) communication systems. Although commonly implemented in dedicated hardware, this paper explores the mapping of high-thr...
Akash Kumar, Kees van Berkel
ISCC
2005
IEEE
120views Communications» more  ISCC 2005»
15 years 10 months ago
Modular Reference Implementation of an IP-DSLAM
We describe a modular reference implementation of an IPbased DSL access multiplexer (DSLAM). We identify deployment trends and primary tasks a future DSLAM has to offer. The imple...
Christian Sauer, Matthias Gries, Sören Sonnta...
COCOA
2008
Springer
15 years 6 months ago
Efficient Method for Periodic Task Scheduling with Storage Requirement Minimization
Abstract. In this paper, we study an efficient approximate integer linear programming formulation of the general problem of one-dimensional periodic task scheduling under storage r...
Karine Deschinkel, Sid Ahmed Ali Touati
ERSA
2007
113views Hardware» more  ERSA 2007»
15 years 6 months ago
Autonomous Computing Systems: A Proof-of-Concept
This paper describes a proof-of-concept implementation of a basic autonomous computing system. The system consists of an XUP Virtex-II Pro board running Linux and a set of softwar...
Neil Steiner, Peter M. Athanas
136
Voted
ASYNC
2002
IEEE
123views Hardware» more  ASYNC 2002»
15 years 10 months ago
Improving Smart Card Security Using Self-Timed Circuits
We demonstrate how 1-of-n encoded speed-independent circuits provide a good framework for constructing smart card functions that are resistant to side channel attacks and fault in...
Simon W. Moore, Robert D. Mullins, Paul A. Cunning...