Sciweavers

6546 search results - page 1090 / 1310
» Improving the Performance of the RISE Algorithm
Sort
View
CHES
2009
Springer
150views Cryptology» more  CHES 2009»
15 years 11 months ago
A Design Flow and Evaluation Framework for DPA-Resistant Instruction Set Extensions
Power-based side channel attacks are a significant security risk, especially for embedded applications. To improve the security of such devices, protected logic styles have been p...
Francesco Regazzoni, Alessandro Cevrero, Fran&cced...
CEC
2009
IEEE
15 years 11 months ago
Coevolution of simulator proxies and sampling strategies for petroleum reservoir modeling
— Reservoir modeling is an on-going activity during the production life of a reservoir. One challenge to constructing accurate reservoir models is the time required to carry out ...
Tina Yu, Dave Wilkinson
ICC
2009
IEEE
15 years 11 months ago
Robust Cyclic Space-Frequency Filtering for BICM-OFDM with Outdated CSIT
— In this paper, we introduce robust cyclic space– frequency (CSF) filtering for systems combining bit–interleaved coded modulation (BICM) and orthogonal frequency division ...
Harry Z. B. Chen, Robert Schober, Wolfgang H. Gers...
ICC
2009
IEEE
174views Communications» more  ICC 2009»
15 years 11 months ago
Biometric Mobile Template Protection: A Composite Feature Based Fingerprint Fuzzy Vault
—Biometric authentication is emerging as the promising solution to conventional cryptography based authentication technologies. However, protecting users’ biometric templates s...
Kai Xi, Jiankun Hu
RTCSA
2009
IEEE
15 years 11 months ago
Dynamic Thermal and Timeliness Guarantees for Distributed Real-Time Embedded Systems
Distributed real-time embedded systems have stringent requirements for key performance properties, such as endto-end timeliness and reliability, in order to operate properly. In r...
Xing Fu, Xiaorui Wang, Eric Puster
« Prev « First page 1090 / 1310 Last » Next »