Sciweavers

1739 search results - page 298 / 348
» Battery Model for Embedded Systems
Sort
View
EDCC
2008
Springer
14 years 23 days ago
Practical Setup Time Violation Attacks on AES
Faults attacks are a powerful tool to break some implementations of robust cryptographic algorithms such as AES [8] and DES [3]. Various methods of faults attack on cryptographic ...
Nidhal Selmane, Sylvain Guilley, Jean-Luc Danger
WSC
2004
14 years 11 days ago
Applying Statistical Control Techniques to Air Traffic Simulations
While the literature contains several adaptive sampling techniques for statistical comparison of competing simulated system configurations and for embedded statistical computation...
Kirk C. Benson, David Goldsman, Amy R. Pritchett
SEBD
1997
134views Database» more  SEBD 1997»
14 years 10 days ago
A Systematic Approach to Multidimensional Databases
Abstract. Multidimensional databases are large collections of data, often historical, used for sophisticated analysis oriented to decision making. This activity is supported by an ...
Luca Cabibbo, Riccardo Torlone
ICSE
2007
IEEE-ACM
14 years 11 months ago
Collaboration in Software Engineering: A Roadmap
Software engineering projects are inherently cooperative, requiring many software engineers to coordinate their efforts to produce a large software system. Integral to this effort...
Jim Whitehead
TVLSI
2008
187views more  TVLSI 2008»
13 years 11 months ago
A Design Flow for Architecture Exploration and Implementation of Partially Reconfigurable Processors
During the last years, the growing application complexity, design, and mask costs have compelled embedded system designers to increasingly consider partially reconfigurable applica...
Kingshuk Karuri, Anupam Chattopadhyay, Xiaolin Che...