Sciweavers

304 search results - page 41 / 61
» An Access Timing Measurement Unit of Embedded Memory
Sort
View
104
Voted
CRYPTO
2005
Springer
103views Cryptology» more  CRYPTO 2005»
15 years 9 months ago
Pebbling and Proofs of Work
We investigate methods for providing easy-to-check proofs of computational effort. Originally intended for discouraging spam, the concept has wide applicability as a method for co...
Cynthia Dwork, Moni Naor, Hoeteck Wee
122
Voted
ICMCS
2006
IEEE
151views Multimedia» more  ICMCS 2006»
15 years 9 months ago
Joint Rate-Distortion-Complexity Optimization for H.264 Motion Search
A joint rate-distortion-complexity H.264 motion search framework is proposed to balance the encoder’s coding efficiency and complexity in an embedded system environment. Under ...
Yu Hu, Qing Li, Siwei Ma, C. C. Jay Kuo
151
Voted
CHES
2006
Springer
158views Cryptology» more  CHES 2006»
15 years 7 months ago
Hardware/Software Co-design of Elliptic Curve Cryptography on an 8051 Microcontroller
8-bit microcontrollers like the 8051 still hold a considerable share of the embedded systems market and dominate in the smart card industry. The performance of 8-bit microcontrolle...
Manuel Koschuch, Joachim Lechner, Andreas Weitzer,...
WORDS
2002
IEEE
15 years 8 months ago
Service Differentiation of Communication-bound Processes in a Real-Time Operating System
The majority of today’s Internet-based services are generally not concerned about the level of Quality of Service (QoS) presented to their users. For many such services, however...
Domenico Cotroneo, Massimo Ficco, Mauro Gargiulo, ...
140
Voted
ESAS
2005
Springer
15 years 9 months ago
Remote Software-Based Attestation for Wireless Sensors
Wireless sensor networks are envisioned to be deployed in mission-critical applications. Detecting a compromised sensor, whose memory contents have been tampered, is crucial in the...
Mark Shaneck, Karthikeyan Mahadevan, Vishal Kher, ...