Sciweavers

1734 search results - page 22 / 347
» its 2000
Sort
View
ACSAC
2000
IEEE
15 years 2 months ago
The Chinese Remainder Theorem and its Application in a High-Speed RSA Crypto Chip
The performance of RSA hardware is primarily determined by an efficient implementation of the long integer modular arithmetic and the ability to utilize the Chinese Remainder The...
Johann Großschädl
VTS
2000
IEEE
94views Hardware» more  VTS 2000»
15 years 2 months ago
On Testing the Path Delay Faults of a Microprocessor Using its Instruction Set
1 This paper addresses the problem of testing path delay faults in a microprocessor using instructions. It is observed that a structurally testable path (i.e., a path testable thro...
Wei-Cheng Lai, Angela Krstic, Kwang-Ting Cheng
76
Voted
SIGSOFT
2000
ACM
15 years 2 months ago
Accumulative versioning file system Moraine and its application to metrics environment MAME
It is essential to manage versions of software products created during software development. There are various versioning tools actually used in these days, although most of them ...
Tetsuo Yamamoto, Makoto Matsushita, Katsuro Inoue
79
Voted
BMVC
2000
14 years 11 months ago
The Cross Ratio: A Revisit to its Probability Density Function
The cross ratio has wide applications in computer vision because of its invariance under projective transformation. In active vision where the projections of quadruples of colline...
D. Q. Huynh
72
Voted
MICRO
2006
IEEE
114views Hardware» more  MICRO 2006»
15 years 3 months ago
Authentication Control Point and Its Implications For Secure Processor Design
Secure processor architecture enables tamper-proof protection on software that addresses many difficult security problems such as reverse-engineering prevention, trusted computing...
Weidong Shi, Hsien-Hsin S. Lee