Sciweavers

3190 search results - page 16 / 638
» cans 2011
Sort
View
AQUILEIA
2011
75views more  AQUILEIA 2011»
13 years 9 months ago
Aerial Photography and Archival Data: Some Examples of Combined Study in the Suburbium of Aquileia
: Starting from the rich historical documentation of the National Archaeological Museum of Aquileia, we provide some examples of crosschecking aerial photography and archival data,...
Paola Ventura, Paola Maggi, Flaviana Oriolo
CICC
2011
72views more  CICC 2011»
13 years 9 months ago
Exploration of on-chip switched-capacitor DC-DC converter for multicore processors using a distributed power delivery network
Abstract—In this paper, we explore the design of on-chip switchedcapacitor (SC) DC-DC converters in the context of multicore processors, using an accurate power grid simulator. R...
Pingqiang Zhou, Dong Jiao, Chris H. Kim, Sachin S....
62
Voted
EPART
2011
103views more  EPART 2011»
13 years 9 months ago
Towards a Structured Online Consultation Tool
Abstract. The Structured Online Consultation tool (SCT) is a component tool in the IMPACT Project which is used to construct and present detailed surveys that solicit feedback from...
Adam Zachary Wyner, Katie Atkinson, Trevor J. M. B...
IACR
2011
128views more  IACR 2011»
13 years 9 months ago
Fault-propagation Pattern Based DFA on SPN Structure Block Ciphers using Bitwise Permutation, with Application to PRESENT and PR
—This paper proposes a novel fault-propagation pattern based differential fault analysis method - FPP-DFA, and proves its feasibility on SPN structure block ciphers using bitwise...
Xin-jie Zhao, Tao Wang, Shi-ze Guo
IACR
2011
243views more  IACR 2011»
13 years 9 months ago
Guess-then-Meet-in-the-Middle Attacks on the KTANTAN Family of Block Ciphers
The block cipher family for lightweight devices, KTANTAN, is analyzed in this paper. We propose a new cryptanalysis method which improves results of Meet-in-the-Middle attacks on K...
Bo Zhu, Guang Gong