Sciweavers

1957 search results - page 249 / 392
» Embedded Processor Security
Sort
View
JMM2
2008
130views more  JMM2 2008»
15 years 5 months ago
A Robust Image Watermarking Scheme using Singular Value Decomposition
This paper presents a robust image watermarking scheme for multimedia copyright protection. In this work, host image is partitioned into four sub images. Watermark image such as `l...
B. Chandra Mohan, S. Srinivas Kumar
VLDB
2006
ACM
490views Database» more  VLDB 2006»
17 years 4 months ago
The New Casper: Query Processing for Location Services without Compromising Privacy
This paper tackles a major privacy concern in current location-based services where users have to continuously report their locations to the database server in order to obtain the ...
Mohamed F. Mokbel, Chi-Yin Chow, Walid G. Aref
DAC
2008
ACM
16 years 6 months ago
Compiler-driven register re-assignment for register file power-density and temperature reduction
Temperature hot-spots have been known to cause severe reliability problems and to significantly increase leakage power. The register file has been previously shown to exhibit the ...
Xiangrong Zhou, Chenjie Yu, Peter Petrov
DAC
2002
ACM
16 years 6 months ago
An integer linear programming based approach for parallelizing applications in On-chip multiprocessors
With energy consumption becoming one of the first-class optimization parameters in computer system design, compilation techniques that consider performance and energy simultaneous...
Ismail Kadayif, Mahmut T. Kandemir, Ugur Sezer
CHES
2009
Springer
230views Cryptology» more  CHES 2009»
16 years 5 months ago
Designing an ASIP for Cryptographic Pairings over Barreto-Naehrig Curves
Abstract. This paper presents a design-space exploration of an applicationspecific instruction-set processor (ASIP) for the computation of various cryptographic pairings over Barre...
David Kammler, Diandian Zhang, Dominik Auras, Gerd...