Sciweavers

123 search results - page 17 / 25
» The Power of One Move: Hashing Schemes for Hardware
Sort
View
67
Voted
ICCD
2008
IEEE
124views Hardware» more  ICCD 2008»
15 years 6 months ago
Global bus route optimization with application to microarchitectural design exploration
— Circuit and processor designs will continue to increase in complexity for the foreseeable future. With these increasing sizes comes the use of wide buses to move large amounts ...
Dae Hyun Kim, Sung Kyu Lim
SIGCOMM
2012
ACM
13 years 2 days ago
Revealing contact interval patterns in large scale urban vehicular ad hoc networks
Contact interval between moving vehicles is one of the key metrics in vehicular ad hoc networks (VANETs), which is important to routing schemes and network capacity. In this work,...
Yong Li, Depeng Jin, Pan Hui, Li Su, Lieguang Zeng
CCS
2003
ACM
15 years 2 months ago
Cryptographic tamper evidence
We propose a new notion of cryptographic tamper evidence. A tamper-evident signature scheme provides an additional procedure Div which detects tampering: given two signatures, Div...
Gene Itkis
DAC
2006
ACM
15 years 10 months ago
Subthreshold logical effort: a systematic framework for optimal subthreshold device sizing
Subthreshold circuit designs have been demonstrated to be a successful alternative when ultra-low power consumption is paramount. However, the characteristics of MOS transistors i...
John Keane, Hanyong Eom, Tae-Hyoung Kim, Sachin S....
EUROSSC
2006
Springer
15 years 1 months ago
Towards Hovering Information
This paper introduces a new concept of information that can exist in a mobile environment with no fixed infrastructure and centralized servers, which we call the Hovering Informati...
Alfredo A. Villalba Castro, Dimitri Konstantas