Sciweavers

7121 search results - page 1299 / 1425
» Functions as Session-Typed Processes
Sort
View
DAC
2007
ACM
16 years 4 months ago
Trusted Hardware: Can It Be Trustworthy?
Processing and storage of confidential or critical information is an every day occurrence in computing systems. The trustworthiness of computing devices has become an important co...
Cynthia E. Irvine, Karl N. Levitt
122
Voted
DAC
2000
ACM
16 years 4 months ago
Fingerprinting intellectual property using constraint-addition
Recently, intellectual property protection (IPP) techniques attracted a great deal of attention from semiconductor, system integration and software companies. A number of watermar...
Gang Qu, Miodrag Potkonjak
DAC
2001
ACM
16 years 4 months ago
A True Single-Phase 8-bit Adiabatic Multiplier
This paper presents the design and evaluation of an 8-bit adiabatic multiplier. Both the multiplier core and its built-in self-test logic have been designed using a true single-ph...
Suhwan Kim, Conrad H. Ziesler, Marios C. Papaefthy...
DAC
2005
ACM
16 years 4 months ago
Advanced Timing Analysis Based on Post-OPC Extraction of Critical Dimensions
While performance specifications are verified before sign-off for a modern nanometer scale design, extensive application of optical proximity correction substantially alters the l...
Puneet Gupta, Andrew B. Kahng, Youngmin Kim, Denni...
IPMI
2009
Springer
16 years 4 months ago
DRAMMS: Deformable Registration via Attribute Matching and Mutual-Saliency weighting
A general-purpose deformable registration algorithm referred to as ”DRAMMS” is presented in this paper. DRAMMS adds to the literature of registration methods that bridge betw...
Yangming Ou, Christos Davatzikos
« Prev « First page 1299 / 1425 Last » Next »