Sciweavers

3893 search results - page 672 / 779
» Execution Architectures and Compilation
Sort
View
AFRICACRYPT
2010
Springer
15 years 8 months ago
Fresh Re-keying: Security against Side-Channel and Fault Attacks for Low-Cost Devices
The market for RFID technology has grown rapidly over the past few years. Going along with the proliferation of RFID technology is an increasing demand for secure and privacy-prese...
Marcel Medwed, François-Xavier Standaert, J...
DSRT
2008
IEEE
15 years 8 months ago
Simulating the Potential Savings of Implicit Energy Management on a City Scale
According to statistics and future prospects in the next few years world-wide energy consumption will increase significantly. Therefore not only more energy efficient technologi...
Doris Zachhuber, Jakob Doppler, Alois Ferscha, Cor...
GLOBECOM
2008
IEEE
15 years 8 months ago
Evaluating the Performance on ID/Loc Mapping
—Challenges of routing scalability has attracted many research efforts, represented by the works of splitting identifier and locator semantics of IP addresses. A group of identi...
Hong Zhang, Maoke Chen, Yuncheng Zhu
ICASSP
2008
IEEE
15 years 8 months ago
Analyzing the scalability of SIMD for the next generation software defined radio
Previous studies have shown that wireless DSP algorithms exhibit high levels of data level parallelism (DLP). Commercial and research work in the field of software defined radio...
Mark Woh, Yuan Lin, Sangwon Seo, Trevor N. Mudge, ...
ICSEA
2008
IEEE
15 years 8 months ago
Model-Driven Development of Human Tasks for Workflows
In order to increase efficiency, enterprises support their business processes by information technology (IT). The majority of business processes requires human interaction. By mea...
Stefan Link, Philip Hoyer, Thomas Schuster, Sebast...