Sciweavers

124 search results - page 11 / 25
» A survey of the research on power management techniques for ...
Sort
View
EIT
2008
IEEE
13 years 9 months ago
Experiments in attacking FPGA-based embedded systems using differential power analysis
Abstract--In the decade since the concept was publicly introduced, power analysis attacks on cryptographic systems have become an increasingly studied topic in the computer securit...
Song Sun, Zijun Yan, Joseph Zambreno
ESORICS
2009
Springer
14 years 2 months ago
Security Threat Mitigation Trends in Low-Cost RFID Systems
Abstract. The design and implementation of security threat mitigation mechanisms in RFID systems, specially in low-cost RFID tags, are gaining great attention in both industry and ...
Joaquín García-Alfaro, Michel Barbea...
SIGMETRICS
1998
ACM
112views Hardware» more  SIGMETRICS 1998»
13 years 11 months ago
Implementing Cooperative Prefetching and Caching in a Globally-Managed Memory System
This paper presents cooperative prefetching and caching — the use of network-wide global resources (memories, CPUs, and disks) to support prefetching and caching in the presence...
Geoffrey M. Voelker, Eric J. Anderson, Tracy Kimbr...
PPOPP
2005
ACM
14 years 1 months ago
Exposing disk layout to compiler for reducing energy consumption of parallel disk based systems
Disk subsystem is known to be a major contributor to overall power consumption of high-end parallel systems. Past research proposed several architectural level techniques to reduc...
Seung Woo Son, Guangyu Chen, Mahmut T. Kandemir, A...
WSC
1997
13 years 8 months ago
Part and Tool Flow Management in Multi-Cell Flexible Manufacturing System
Simulation techniques have been proven as reliable and powerful tools in the design, development, evaluation and operation of manufacturing systems. The following paper presents a...
Mustafa Özbayrak, A. Kursad Turker, Melek Pis...