Sciweavers

1098 search results - page 126 / 220
» Evaluating Statistical Power Optimization
Sort
View
ICCAD
2009
IEEE
121views Hardware» more  ICCAD 2009»
14 years 7 months ago
MOLES: Malicious off-chip leakage enabled by side-channels
Economic incentives have driven the semiconductor industry to separate design from fabrication in recent years. This trend leads to potential vulnerabilities from untrusted circui...
Lang Lin, Wayne Burleson, Christof Paar
DPHOTO
2010
287views Hardware» more  DPHOTO 2010»
14 years 11 months ago
Dead leaves model for measuring texture quality on a digital camera
We describe the procedure to evaluate the image quality of a camera in terms of texture preservation. We use a stochastic model coming from stochastic geometry, and known as the d...
Frédéric Cao, Frederic Guichard, Her...
ISCAPDCS
2004
14 years 11 months ago
Detecting Grid-Abuse Attacks by Source-based Monitoring
While it provides the unprecedented processing power to solve many large scale computational problems, GRID, if abused, has the potential to easily be used to launch (for instance...
Jianjia Wu, Dan Cheng, Wei Zhao
CN
1998
59views more  CN 1998»
14 years 9 months ago
Daisy: A Scalable All-Optical Packet Network with Multifiber Ring Topology
This paper presents Daisy, a scalable all-optical packet network where each node is equipped with one wavelength-tunable transmitter and one fixed-wavelength receiver. Network sca...
Marco Ajmone Marsan, Andrea Fumagalli, Emilio Leon...
VLSID
2009
IEEE
155views VLSI» more  VLSID 2009»
15 years 10 months ago
Unified Challenges in Nano-CMOS High-Level Synthesis
: The challenges in nano-CMOS circuit design include the following: variability, leakage, power, thermals, reliability, and yield. This talk will focus on interdependent considerat...
Saraju P. Mohanty