Sciweavers

623 search results - page 81 / 125
» Side-Channel Issues for Designing Secure Hardware Implementa...
Sort
View
143
Voted
CF
2007
ACM
15 years 7 months ago
Accelerating memory decryption and authentication with frequent value prediction
This paper presents a novel architectural technique to hide fetch latency overhead of hardware encrypted and authenticated memory. A number of recent secure processor designs have...
Weidong Shi, Hsien-Hsin S. Lee
144
Voted
FCCM
2005
IEEE
115views VLSI» more  FCCM 2005»
15 years 9 months ago
FIFO Communication Models in Operating Systems for Reconfigurable Computing
Increasing demands upon embedded systems for higher level services like networking, user interfaces and file system management, are driving growth in fully-featured operating syst...
John A. Williams, Neil W. Bergmann, X. Xie
154
Voted
MICRO
2008
IEEE
113views Hardware» more  MICRO 2008»
15 years 10 months ago
From SODA to scotch: The evolution of a wireless baseband processor
With the multitude of existing and upcoming wireless standards, it is becoming increasingly difficult for hardware-only baseband processing solutions to adapt to the rapidly chan...
Mark Woh, Yuan Lin, Sangwon Seo, Scott A. Mahlke, ...
105
Voted
MOBISYS
2007
ACM
16 years 3 months ago
Context-aware access to public shared devices
To allow for an efficient usage of a device in pervasive computing environments, reliable and yet convenient user access is an important requirement. The problem becomes more comp...
David Jea, Ian Yap, Mani B. Srivastava
112
Voted
ADBIS
2009
Springer
144views Database» more  ADBIS 2009»
15 years 10 months ago
Learning Support and Legally Ruled Collaboration in the VirtualLife Virtual World Platform
The paper addresses the purposes and design decisions produced while developing a peer-to-peer virtual world platform. The work is being done within the FP7 VirtualLife project. Th...
Vytautas Cyras, Kristina Lapin