Sciweavers

6514 search results - page 514 / 1303
» Low-Knowledge Algorithm Control
Sort
View
SBCCI
2005
ACM
136views VLSI» more  SBCCI 2005»
15 years 10 months ago
Current mask generation: a transistor level security against DPA attacks
The physical implementation of cryptographic algorithms may leak to some attacker security information by the side channel data, as power consumption, timing, temperature or elect...
Daniel Mesquita, Jean-Denis Techer, Lionel Torres,...
137
Voted
IICS
2005
Springer
15 years 10 months ago
Compositional Constraints Generation for Concurrent Real-Time Loops with Interdependent Iterations
Abstract. In this paper we describe an assume/guarantee based execution constraints synthesis algorithm for concurrent threads executing on parallel platforms. Threads are loops wh...
Ismail Assayad, Sergio Yovine
RTSS
2002
IEEE
15 years 10 months ago
End-to-end Fairness Analysis of Fair Queuing Networks
In this paper, we present the first end-to-end fairness analysis of a network of fair servers. We argue that it is difficult to extend existing single-node fairness analysis to ...
Jasleen Kaur, Harrick M. Vin
NPIV
1998
ACM
117views Visualization» more  NPIV 1998»
15 years 9 months ago
Data Object and Label Placement For Information Abundant Visualizations
Placing numerous data objects and their corresponding labels in limited screen space is a challenging problem in information visualization systems. Extending map-oriented techniqu...
Jia Li, Catherine Plaisant, Ben Shneiderman
122
Voted
RTSS
1994
IEEE
15 years 9 months ago
Efficient Aperiodic Service Under Earliest Deadline Scheduling
In this paper we present four new on-line algorithms for servicing soft aperiodic requests in real-time systems, where a set of hard periodic lash is scheduled using the Earliest ...
Marco Spuri, Giorgio C. Buttazzo