Sciweavers

5639 search results - page 905 / 1128
» Timed Abstract Non-interference
Sort
View
CHES
2008
Springer
84views Cryptology» more  CHES 2008»
15 years 5 months ago
A Real-World Attack Breaking A5/1 within Hours
Abstract. In this paper we present a real-world hardware-assisted attack on the wellknown A5/1 stream cipher which is (still) used to secure GSM communication in most countries all...
Timo Gendrullis, Martin Novotný, Andy Rupp
CIKM
2008
Springer
15 years 5 months ago
Workload-based optimization of integration processes
The efficient execution of integration processes between distributed, heterogeneous data sources and applications is a challenging research area of data management. These inn proc...
Matthias Böhm, Uwe Wloka, Dirk Habich, Wolfga...
AMDO
2006
Springer
15 years 5 months ago
Interactive Soft Object Simulation with Quadratic Finite Elements
Abstract. We present a new method to simulate deformable volumetric objects interactively using finite elements. With quadratic basis functions and a non-linear strain tensor, we a...
Johannes Mezger, Wolfgang Straßer
ASPDAC
2005
ACM
96views Hardware» more  ASPDAC 2005»
15 years 5 months ago
Comprehensive frequency dependent interconnect extraction and evaluation methodology
Abstract— Frequency dependent interconnect analysis is challenging since lumped equivalent circuit models extracted at different frequencies exhibit distinct time and frequency d...
Rong Jiang, Charlie Chung-Ping Chen
ASPDAC
2005
ACM
107views Hardware» more  ASPDAC 2005»
15 years 5 months ago
Making fast buffer insertion even faster via approximation techniques
Abstract— As technology scales to 0.13 micron and below, designs are requiring buffers to be inserted on interconnects of even moderate length for both critical paths and fixing...
Zhuo Li, Cliff C. N. Sze, Charles J. Alpert, Jiang...