Sciweavers

30240 search results - page 5878 / 6048
» Robust System Design
Sort
View
ICCD
2008
IEEE
142views Hardware» more  ICCD 2008»
16 years 1 months ago
Making register file resistant to power analysis attacks
— Power analysis attacks are a type of side-channel attacks that exploits the power consumption of computing devices to retrieve secret information. They are very effective in br...
Shuo Wang, Fan Zhang, Jianwei Dai, Lei Wang, Zhiji...
ICCAD
2006
IEEE
101views Hardware» more  ICCAD 2006»
16 years 1 months ago
A spectrally accurate integral equation solver for molecular surface electrostatics
Electrostatic analysis of complicated molecular surfaces arises in a number of nanotechnology applications including: biomolecule design, carbon nanotube simulation, and molecular...
Shih-Hsien Kuo, Jacob White
ICCAD
2004
IEEE
114views Hardware» more  ICCAD 2004»
16 years 1 months ago
High-level synthesis using computation-unit integrated memories
Abstract— High-level synthesis (HLS) of memory-intensive applications has featured several innovations in terms of enhancements made to the basic memory organization and data lay...
Chao Huang, Srivaths Ravi, Anand Raghunathan, Nira...
ICCAD
2004
IEEE
191views Hardware» more  ICCAD 2004»
16 years 1 months ago
Checking consistency of C and Verilog using predicate abstraction and induction
edicate Abstraction and Induction Edmund Clarke Daniel Kroening June 25, 2004 CMU-CS-04-131 School of Computer Science Carnegie Mellon University Pittsburgh, PA 15213 It is common...
Daniel Kroening, Edmund M. Clarke
IUI
2010
ACM
16 years 1 months ago
The why UI: using goal networks to improve user interfaces
People interact with interfaces to accomplish goals, and knowledge about human goals can be useful for building intelligent user interfaces. We suggest that modeling high, human-l...
Dustin Arthur Smith, Henry Lieberman
« Prev « First page 5878 / 6048 Last » Next »