Sciweavers

222 search results - page 17 / 45
» Performance Impact of Addressing Modes on Encryption Algorit...
Sort
View
DCC
2008
IEEE
15 years 9 months ago
Drift Characterization of Intra Prediction and Quantization in H.264
The combination of intra prediction, transform, and quantization in the H.264/AVC video coding standard offers high compression performance in picture areas where inter prediction...
Athanasios Leontaris, Alexis M. Tourapis
MTV
2007
IEEE
121views Hardware» more  MTV 2007»
15 years 4 months ago
Chico: An On-chip Hardware Checker for Pipeline Control Logic
The widening gap between CPU complexity and verification capability is becoming increasingly more salient. It is impossible to completely verify the functionality of a modern mic...
Andrew DeOrio, Adam Bauserman, Valeria Bertacco
ACMSE
2004
ACM
15 years 3 months ago
A framework for trusted instruction execution via basic block signature verification
Most of today’s computers are connected to the Internet or at least to a local network, exposing system vulnerabilities to the potential attackers. One of the attackers’ goals...
Milena Milenkovic, Aleksandar Milenkovic, Emil Jov...
CARDIS
2006
Springer
187views Hardware» more  CARDIS 2006»
15 years 1 months ago
Low-Cost Cryptography for Privacy in RFID Systems
Massively deploying RFID systems while preserving people's privacy and data integrity is a major security challenge of the coming years. Up to now, it was commonly believed th...
Benoît Calmels, Sébastien Canard, Mar...
JCP
2007
148views more  JCP 2007»
14 years 9 months ago
P3ARM-t: Privacy-Preserving Protocol for Association Rule Mining with t Collusion Resistance
— The ability to mine large volumes of distributed datasets enables more precise decision making. However, privacy concerns should be carefully addressed when mining datasets dis...
Iman Saleh, Mohamed Eltoweissy