Sciweavers

2916 search results - page 519 / 584
» The simulation power of automod
Sort
View
SP
2007
IEEE
108views Security Privacy» more  SP 2007»
15 years 4 months ago
Trojan Detection using IC Fingerprinting
Hardware manufacturers are increasingly outsourcing their IC fabrication work overseas due to much lower costs. This poses a significant security risk for ICs used for critical m...
Dakshi Agrawal, Selçuk Baktir, Deniz Karako...
CLUSTER
2007
IEEE
15 years 4 months ago
Thermal-aware task scheduling for data centers through minimizing heat recirculation
— The thermal environment of data centers plays a significant role in affecting the energy efficiency and the reliability of data center operation. A dominant problem associate...
Qinghui Tang, Sandeep K. S. Gupta, Georgios Varsam...
CCS
2007
ACM
15 years 4 months ago
The energy cost of cryptographic key establishment in wireless sensor networks
Wireless sensor nodes generally face serious limitations in terms of computational power, energy supply, and network bandwidth. Therefore, the implementation of effective and sec...
Johann Großschädl, Alexander Szekely, S...
GECCO
2007
Springer
268views Optimization» more  GECCO 2007»
15 years 4 months ago
Vulnerability analysis and security framework (BeeSec) for nature inspired MANET routing protocols
Design, development and evaluation of adaptive, scalable, and power aware Bio/Nature inspired routing protocols has received a significant amount of attention in the recent past....
Nauman Mazhar, Muddassar Farooq
DATE
2006
IEEE
112views Hardware» more  DATE 2006»
15 years 3 months ago
A fast-lock mixed-mode DLL with wide-range operation and multiphase outputs
This paper describes a fast-lock mixed-mode delaylocked loop (MMDLL) for wide-range operation and multiphase outputs. The architecture of the proposed DLL uses the mixed-mode time...
Kuo-Hsing Cheng, Yu-lung Lo