Sciweavers

2703 search results - page 353 / 541
» Optimizing memory transactions
Sort
View
114
Voted
SAC
2008
ACM
15 years 3 months ago
Offline count-limited certificates
In this paper, we present the idea of offline count-limited certificates (or clics for short), and show how these can be implemented using minimal trusted hardware functionality a...
Luis F. G. Sarmenta, Marten van Dijk, Jonathan Rho...
VLSID
2004
IEEE
112views VLSI» more  VLSID 2004»
16 years 4 months ago
Designing Leakage Aware Multipliers
Power consumption has become a major design limiter. With the continued reduction of threshold voltages, optimizing leakage energy consumption is becoming increasingly important. ...
M. DeRenzo, Mary Jane Irwin, Narayanan Vijaykrishn...
141
Voted
FSE
2009
Springer
107views Cryptology» more  FSE 2009»
15 years 10 months ago
Multidimensional Extension of Matsui's Algorithm 2
Matsui’s one-dimensional Alg. 2 can be used for recovering bits of the last round key of a block cipher. In this paper a truly multidimensional extension of Alg. 2 based on estab...
Miia Hermelin, Joo Yeon Cho, Kaisa Nyberg
153
Voted
VTS
2006
IEEE
102views Hardware» more  VTS 2006»
15 years 9 months ago
Energy Efficient Software-Based Self-Test for Wireless Sensor Network Nodes
We consider self-testing of complete wireless nodes in the field through a low-energy software-based selftest (SBST) method. Energy consumption is optimized both for individual co...
Rong Zhang, Zeljko Zilic, Katarzyna Radecka
124
Voted
ADMA
2005
Springer
119views Data Mining» more  ADMA 2005»
15 years 9 months ago
Heuristic Scheduling of Concurrent Data Mining Queries
Execution cost of batched data mining queries can be reduced by integrating their I/O steps. Due to memory limitations, not all data mining queries in a batch can be executed toget...
Marek Wojciechowski, Maciej Zakrzewicz