Sciweavers

861 search results - page 27 / 173
» Internal implementation
Sort
View
CHES
2000
Springer
135views Cryptology» more  CHES 2000»
15 years 4 months ago
Protecting Smart Cards from Passive Power Analysis with Detached Power Supplies
Power analysis is a very successful cryptanalytic technique which extracts secret information from smart cards by analysing the power consumed during the execution of their interna...
Adi Shamir
ESOA
2006
15 years 3 months ago
Hybrid Multi-agent Systems: Integrating Swarming and BDI Agents
The individual agents that interact in a multi-agent system typically exist along a continuum ranging from heavyweight cognitive agents (often of the "BDI" type) to light...
H. Van Dyke Parunak, Paul Nielsen, Sven Brueckner,...
EURODAC
1995
IEEE
117views VHDL» more  EURODAC 1995»
15 years 3 months ago
Performance-complexity analysis in hardware-software codesign for real-time systems
The paper presents an approach for performance and complexity analysis of hardware/software implementations for real-time systems on every stage of the partitioning. There are two...
Victor V. Toporkov
77
Voted
ISCAS
2005
IEEE
173views Hardware» more  ISCAS 2005»
15 years 5 months ago
Slack-time aware routing in NoC systems
—Efficient routing schemes are essential if Network on Chip (NoC) architectures are to be used for implementing multi-core systems for real-time multi-media applications. These s...
Daniel Andreasson, Shashi Kumar
ECUMN
2007
Springer
15 years 3 months ago
Improved User Identity Confidentiality for UMTS Mobile Networks
In UMTS mobile networks, there are some circumstances that the International Mobile Subscriber Identity (IMSI) of a user is conveyed in clear-text over the radio interface. Such s...
Behnam Sattarzadeh, Mahdi Asadpour, Rasool Jalili