Sciweavers

1179 search results - page 31 / 236
» Relative Timing Based Verification of Timed Circuits and Sys...
Sort
View
FC
2000
Springer
83views Cryptology» more  FC 2000»
15 years 3 months ago
Secret Key Authentication with Software-Only Verification
Abstract Two protocols for authentication based on symmetric key cryptography are described, where the verifier can be implemented in software completely, without the need for secu...
Jaap-Henk Hoepman
JCP
2008
155views more  JCP 2008»
14 years 11 months ago
Algorithm to Optimize Code Size and Energy Consumption in Real Time Embedded System
Processor is an important computing element in portable battery operated real time embedded system and it consumes most of the battery energy. Energy consumption, processor memory ...
Santosh D. Chede, Kishore D. Kulat
ICCAD
2001
IEEE
108views Hardware» more  ICCAD 2001»
15 years 8 months ago
Placement Driven Retiming with a Coupled Edge Timing Model
Retiming is a widely investigated technique for performance optimization. It performs powerful modifications on a circuit netlist. However, often it is not clear, whether the pred...
Ingmar Neumann, Wolfgang Kunz
CBSE
2004
Springer
15 years 5 months ago
Introducing a Component Technology for Safety Critical Embedded Real-Time Systems
Safety critical embedded real-time systems represent a class of systems that has attracted relatively little attention in research addressing component based software engineering. ...
Kristian Sandström, Johan Fredriksson, Mikael...
ICCAD
2006
IEEE
183views Hardware» more  ICCAD 2006»
15 years 8 months ago
Soft error derating computation in sequential circuits
Soft error tolerant design becomes more crucial due to exponential increase in the vulnerability of computer systems to soft errors. Accurate estimation of soft error rate (SER), ...
Hossein Asadi, Mehdi Baradaran Tahoori