Sciweavers

3116 search results - page 354 / 624
» Recovering
Sort
View
ISPEC
2009
Springer
15 years 12 months ago
On the Correctness of an Approach against Side-Channel Attacks
Abstract. Side-channel attacks are a very powerful cryptanalytic technique. Li and Gu [ProvSec’07] proposed an approach against side-channel attacks, which states that a symmetri...
Peng Wang, Dengguo Feng, Wenling Wu, Liting Zhang
VMCAI
2009
Springer
15 years 12 months ago
SubPolyhedra: A (More) Scalable Approach to Infer Linear Inequalities
Abstract. We introduce Subpolyhedra (SubPoly) a new numerical abstract domain to infer and propagate linear inequalities. SubPoly is as expressive as Polyhedra, but it drops some o...
Vincent Laviron, Francesco Logozzo
DATE
2009
IEEE
145views Hardware» more  DATE 2009»
15 years 12 months ago
Joint logic restructuring and pin reordering against NBTI-induced performance degradation
Negative Bias Temperature Instability (NBTI), a PMOS aging phenomenon causing significant loss on circuit performance and lifetime, has become a critical challenge for temporal re...
Kai-Chiang Wu, Diana Marculescu
GLOBECOM
2009
IEEE
15 years 12 months ago
REPARE: Regenerator Placement and Routing Establishment in Translucent Networks
—Most research works in routing and design of optical networks assume that the optical medium can carry data signals without any bit error. However, physical impairments of the o...
Weiyi Zhang, Jian Tang, Kendall E. Nygard, Chongga...
ICASSP
2009
IEEE
15 years 12 months ago
Background recovery from video sequences using motion parameters
This paper presents a novel scheme for extracting a still background occluded by a number of foreground objects, moving in different directions and velocities in a video sequence,...
Srenivas Varadarajan, Lina J. Karam, Dinei Florenc...