Sciweavers

180 search results - page 28 / 36
» New Point Addition Formulae for ECC Applications
Sort
View
DAC
1994
ACM
15 years 3 months ago
Dynamic Search-Space Pruning Techniques in Path Sensitization
A powerful combinational path sensitization engine is required for the efficient implementation of tools for test pattern generation, timing analysis, and delay fault testing. Path...
João P. Marques Silva, Karem A. Sakallah
110
Voted
CIKM
2007
Springer
15 years 3 months ago
Satisfaction balanced mediation
We consider a distributed information system that allows autonomous consumers to query autonomous providers. We focus on the problem of query allocation from a new point of view, ...
Jorge-Arnulfo Quiané-Ruiz, Philippe Lamarre...
80
Voted
ISSS
1995
IEEE
100views Hardware» more  ISSS 1995»
15 years 3 months ago
Power analysis and low-power scheduling techniques for embedded DSP software
This paper describes the application of a measurement based power analysis technique for an embedded DSP processor. An instruction-level power model for the processor has been dev...
Mike Tien-Chien Lee, Vivek Tiwari, Sharad Malik, M...
91
Voted
ATC
2008
Springer
15 years 1 months ago
Concepts for Autonomous Control Flow Checking for Embedded CPUs
In this paper, we introduce new concepts and methods for checking the correctness of control flow instructions during the execution of programs in embedded CPUs. Detecting and avoi...
Daniel Ziener, Jürgen Teich
97
Voted
ICISC
2003
89views Cryptology» more  ICISC 2003»
15 years 1 months ago
Security Analysis of Some Proxy Signatures
Abstract. A proxy signature scheme allows an entity to delegate his/her signing capability to another entity in such a way that the latter can sign messages on behalf of the former...
Guilin Wang, Feng Bao, Jianying Zhou, Robert H. De...