Sciweavers

1281 search results - page 218 / 257
» Transliteration as Constrained Optimization
Sort
View
CHES
2003
Springer
100views Cryptology» more  CHES 2003»
15 years 3 months ago
Multi-channel Attacks
We introduce multi-channel attacks, i.e., side-channel attacks which utilize multiple side-channels such as power and EM simultaneously. We propose an adversarial model which combi...
Dakshi Agrawal, Josyula R. Rao, Pankaj Rohatgi
CA
2002
IEEE
15 years 2 months ago
Spacetime Sweeping: An Interactive Dynamic Constraints Solver
This paper presents a new method for editing an existing motion to satisfy a set of user-specified constraints, and in doing so guaranteeing the kinematic and dynamic soundness o...
Seyoon Tak, Oh-Young Song, Hyeong-Seok Ko
CODES
2002
IEEE
15 years 2 months ago
Compiler-directed customization of ASIP cores
This paper presents an automatic method to customize embedded application-specific instruction processors (ASIPs) based on compiler analysis. ASIPs, also known as embedded soft c...
T. Vinod Kumar Gupta, Roberto E. Ko, Rajeev Barua
DATE
2002
IEEE
137views Hardware» more  DATE 2002»
15 years 2 months ago
Practical Instruction Set Design and Compiler Retargetability Using Static Resource Models
The design of application (-domain) specific instructionset processors (ASIPs), optimized for code size, has traditionally been accompanied by the necessity to program assembly, ...
Qin Zhao, Bart Mesman, Twan Basten
CDC
2009
IEEE
173views Control Systems» more  CDC 2009»
15 years 2 months ago
Fault tolerant control allocation for a thruster-controlled floating platform using parametric programming
— The task in control allocation is to determine how to generate a specified generalized force from a redundant set of control effectors where the associated actuator control in...
Jørgen Spjøtvold, Tor Arne Johansen