Sciweavers

623 search results - page 100 / 125
» Side-Channel Issues for Designing Secure Hardware Implementa...
Sort
View
151
Voted
CCGRID
2006
IEEE
15 years 7 months ago
IPMI-based Efficient Notification Framework for Large Scale Cluster Computing
The demand for an efficient fault tolerance system has led to the development of complex monitoring infrastructure, which in turn has created an overwhelming task of data and even...
Chokchai Leangsuksun, Tirumala Rao, Anand Tikoteka...
112
Voted
DATE
2008
IEEE
128views Hardware» more  DATE 2008»
15 years 10 months ago
Robust and Low Complexity Rate Control for Solar Powered Sensors
This paper is concerned with solar driven sensors deployed in an outdoor environment. We present feedback controllers which adapt parameters of the application such that a maximal...
Clemens Moser, Lothar Thiele, Davide Brunelli, Luc...
DAC
2009
ACM
16 years 4 months ago
Analysis and mitigation of process variation impacts on Power-Attack Tolerance
Embedded cryptosystems show increased vulnerabilities to implementation attacks such as power analysis. CMOS technology trends are causing increased process variations which impac...
Lang Lin, Wayne P. Burleson
140
Voted
SOUPS
2006
ACM
15 years 9 months ago
An empirical study of natural language parsing of privacy policy rules using the SPARCLE policy workbench
Today organizations do not have good ways of linking their written privacy policies with the implementation of those policies. To assist organizations in addressing this issue, ou...
Carolyn Brodie, Clare-Marie Karat, John Karat
149
Voted
ARC
2008
Springer
95views Hardware» more  ARC 2008»
15 years 5 months ago
The Instruction-Set Extension Problem: A Survey
Over the last years, we have witnessed the increased use of Application-Specific Instruction-Set Processors (ASIPs). These ASIPs are processors that have a customizable instruction...
Carlo Galuzzi, Koen Bertels