Sciweavers

777 search results - page 45 / 156
» presence 2010
Sort
View
ISQED
2010
IEEE
105views Hardware» more  ISQED 2010»
15 years 4 months ago
Leakage current analysis for intra-chip wireless interconnects
A simulation-based feasibility study of an intra-chip wireless interconnect system is presented. The wireless interconnect system is modelled in a 250 nm standard complementary met...
Ankit More, Baris Taskin
102
Voted
ESOP
2010
Springer
15 years 4 months ago
CFA2: A Context-Free Approach to Control-Flow Analysis
Abstract. In a functional language, the dominant control-flow mechanism is function call and return. Most higher-order flow analyses, including k-CFA, do not handle call and retu...
Dimitrios Vardoulakis, Olin Shivers
CSFW
2010
IEEE
15 years 4 months ago
Vulnerability Bounds and Leakage Resilience of Blinded Cryptography under Timing Attacks
—We establish formal bounds for the number of min-entropy bits that can be extracted in a timing attack against a cryptosystem that is protected by blinding, the state-of-the art...
Boris Köpf, Geoffrey Smith
SIGIR
2010
ACM
15 years 4 months ago
Blog snippets: a comments-biased approach
In the last years Blog Search has been a new exciting task in Information Retrieval. The presence of user generated information with valuable opinions makes this field of huge in...
Javier Parapar, Jorge López-Castro, Alvaro ...
WCNC
2010
IEEE
15 years 4 months ago
A Comparison between Stand-Alone and Distributed Architectures for Spectrum Hole Detection
Abstract—In this paper two different cognitive radio architectures, i.e. stand-alone and distributed, are proposed for spectrum sensing purposes. In particular, both architecture...
Luca Bixio, Marina Ottonello, Mirco Raffetto, Carl...