Sciweavers

897 search results - page 77 / 180
» A Methodology for Agent-Oriented Analysis and Design
Sort
View
DATE
2007
IEEE
92views Hardware» more  DATE 2007»
14 years 2 months ago
Overcoming glitches and dissipation timing skews in design of DPA-resistant cryptographic hardware
Cryptographic embedded systems are vulnerable to Differential Power Analysis (DPA) attacks. In this paper, we propose a logic design style, called as Precharge Masked Reed-Muller ...
Kuan Jen Lin, Shan Chien Fang, Shih Hsien Yang, Ch...
SIGECOM
2006
ACM
107views ECommerce» more  SIGECOM 2006»
14 years 2 months ago
Empirical mechanism design: methods, with application to a supply-chain scenario
Our proposed methods employ learning and search techniques to estimate outcome features of interest as a function of mechanism parameter settings. We illustrate our approach with ...
Yevgeniy Vorobeychik, Christopher Kiekintveld, Mic...
ICRE
1996
IEEE
14 years 5 days ago
Collaboration during conceptual design
Conceptual design involves requirements analysis, functional specification, and architectural design. It remains informal and poorly understood. We studied the conceptual design a...
Lara D. Catledge, Colin Potts
SLIP
2006
ACM
14 years 2 months ago
Generation of design guarantees for interconnect matching
Manufacturable design requires matching of interconnects which have equal nominal dimensions. New design rules are projected to bring guarantee rules for interconnect matching. In...
Andrew B. Kahng, Rasit Onur Topaloglu
DATE
1999
IEEE
147views Hardware» more  DATE 1999»
14 years 10 days ago
Efficient BIST Hardware Insertion with Low Test Application Time for Synthesized Data Paths
In this paper, new and efficient BIST methodology and BIST hardware insertion algorithms are presented for RTL data paths obtained from high level synthesis. The methodology is ba...
Nicola Nicolici, Bashir M. Al-Hashimi