Sciweavers

667 search results - page 32 / 134
» Quantization-Based Methods: Additive Attacks Performance Ana...
Sort
View
MICRO
2000
IEEE
96views Hardware» more  MICRO 2000»
15 years 4 months ago
Instruction distribution heuristics for quad-cluster, dynamically-scheduled, superscalar processors
We investigate instruction distribution methods for quadcluster, dynamically-scheduled superscalar processors. We study a variety of methods with different cost, performance and c...
Amirali Baniasadi, Andreas Moshovos
AINA
2009
IEEE
15 years 6 months ago
Modeling Multiprocessor Cache Protocol Impact on MPI Performance
This paper presents a modeling method particularly suited to analyze interactions between Message Passing Interface MPI library execution and distributed cache coherence protocol....
Ghassan Chehaibar, Meriem Zidouni, Radu Mateescu
MTA
2007
122views more  MTA 2007»
14 years 11 months ago
Geometrically invariant watermarking: synchronization through circular Hough transform
This paper addresses a geometrically invariant watermarking method for digital images. Most previous watermarking algorithms perform weakly against geometric distortions, which des...
Hae-Yeoun Lee, Choong-Hoon Lee, Heung-Kyu Lee
IROS
2007
IEEE
143views Robotics» more  IROS 2007»
15 years 6 months ago
Metrics for quantifying system performance in intelligent, fault-tolerant multi-robot teams
— Any system that has the capability to diagnose and recover from faults is considered to be a fault-tolerant system. Additionally, the quality of the incorporated fault-toleranc...
Balajee Kannan, Lynne E. Parker
AFRICACRYPT
2009
Springer
15 years 6 months ago
Breaking KeeLoq in a Flash: On Extracting Keys at Lightning Speed
We present the first simple power analysis (SPA) of software implementations of KeeLoq. Our attack drastically reduces the efforts required for a complete break of remote keyless...
Markus Kasper, Timo Kasper, Amir Moradi, Christof ...