Sciweavers

2679 search results - page 491 / 536
» Experimental Models for Validating Technology
Sort
View
ICCAD
2009
IEEE
121views Hardware» more  ICCAD 2009»
14 years 9 months ago
MOLES: Malicious off-chip leakage enabled by side-channels
Economic incentives have driven the semiconductor industry to separate design from fabrication in recent years. This trend leads to potential vulnerabilities from untrusted circui...
Lang Lin, Wayne Burleson, Christof Paar
IEEEIA
2009
14 years 9 months ago
How Emotional Mechanism Helps Episodic Learning in a Cognitive Agent
In this paper we propose the CTS (Concious Tutoring System) technology, a biologically plausible cognitive agent based on human brain functions.This agent is capable of learning a...
Usef Faghihi, Philippe Fournier-Viger, Roger Nkamb...
101
Voted
CORR
2010
Springer
116views Education» more  CORR 2010»
14 years 6 months ago
Simulating Cyber-Attacks for Fun and Profit
We introduce a new simulation platform called Insight, created to design and simulate cyber-attacks against large arbitrary target scenarios. Insight has surprisingly low hardware...
Ariel Futoransky, Fernando Miranda, José Ig...
CROSSROADS
2010
14 years 6 months ago
Massive multiplayer human computation for fun, money, and survival
Crowdsourcing is an effective tool to solve hard tasks. By bringing 100,000s of people to work on simple tasks that only humans can do, we can go far beyond traditional models of ...
Lukas Biewald
102
Voted
VLSID
2010
IEEE
170views VLSI» more  VLSID 2010»
14 years 5 months ago
Novel Vth Hopping Techniques for Aggressive Runtime Leakage Contro
The continuous increase of leakage power consumption in deep sub-micro technologies necessitates more aggressive leakage control. Runtime leakage control (RTLC) is effective, si...
Hao Xu, Wen-Ben Jone, Ranga Vemuri