Sciweavers

53302 search results - page 280 / 10661
» On the design of a
Sort
View
101
Voted
MICRO
2006
IEEE
114views Hardware» more  MICRO 2006»
15 years 6 months ago
Authentication Control Point and Its Implications For Secure Processor Design
Secure processor architecture enables tamper-proof protection on software that addresses many difficult security problems such as reverse-engineering prevention, trusted computing...
Weidong Shi, Hsien-Hsin S. Lee
ACOM
2006
Springer
15 years 6 months ago
Towards Design Tools for Protocol Development
Interaction protocols enable agents to communicate with each other effectively. Whereas several approaches exist to specify interaction protocols, none of them has design tools th...
Pinar Yolum
DAC
2006
ACM
15 years 6 months ago
Automated design of pin-constrained digital microfluidic arrays for lab-on-a-chip applications*
Microfluidics-based biochips, also referred to as lab-on-a-chip (LoC), are devices that integrate fluid-handling functions such as sample preparation, analysis, separation, and de...
William L. Hwang, Fei Su, Krishnendu Chakrabarty
109
Voted
SAC
2006
ACM
15 years 6 months ago
Methods and guidelines for the design and development of domestic ubiquitous computing applications
Bringing ubiquitous computing applications to home environments is a great challenge. In our research we investigate how applications can be conceived, designed, and implemented t...
Albrecht Schmidt, Lucia Terrenghi
SBCCI
2006
ACM
171views VLSI» more  SBCCI 2006»
15 years 6 months ago
Asynchronous circuit design on reconfigurable devices
This paper presents the design of asynchronous circuits on synchronous FPGAs and CPLDs. Different design styles have been investigated through the implementation of dual-rail full...
R. U. R. Mocho, G. H. Sartori, Renato P. Ribas, An...
« Prev « First page 280 / 10661 Last » Next »