Sciweavers

1992 search results - page 234 / 399
» On the (limited) power of non-equivocation
Sort
View
ACNS
2008
Springer
103views Cryptology» more  ACNS 2008»
15 years 8 months ago
A Very Compact "Perfectly Masked" S-Box for AES
Implementations of the Advanced Encryption Standard (AES), including hardware applications with limited resources (e.g., smart cards), may be vulnerable to “side-channel attacksâ...
D. Canright, Lejla Batina
AVSS
2007
IEEE
15 years 8 months ago
Camera selection in visual sensor networks
Wireless networks of visual sensors have recently emerged as a new type of sensor-based intelligent system, with performance and complexity challenges that go beyond that of exist...
Stanislava Soro, Wendi B. Heinzelman
CODES
2007
IEEE
15 years 8 months ago
Performance analysis and design space exploration for high-end biomedical applications: challenges and solutions
High-end biomedical applications are a good target for specificpurpose system-on-chip (SoC) implementations. Human heart electrocardiogram (ECG) real-time monitoring and analysis ...
Iyad Al Khatib, Davide Bertozzi, Axel Jantsch, Luc...
DATE
2007
IEEE
138views Hardware» more  DATE 2007»
15 years 8 months ago
Low-overhead circuit synthesis for temperature adaptation using dynamic voltage scheduling
—Increasing power density causes die overheating due to limited cooling capacity of the package. Conventional thermal management techniques e.g. logic shutdown, clock gating, fre...
Swaroop Ghosh, Swarup Bhunia, Kaushik Roy
95
Voted
DSN
2007
IEEE
15 years 8 months ago
Computing Battery Lifetime Distributions
The usage of mobile devices like cell phones, navigation systems, or laptop computers, is limited by the lifetime of the included batteries. This lifetime depends naturally on the...
Lucia Cloth, Marijn R. Jongerden, Boudewijn R. Hav...