Sciweavers

1031 search results - page 170 / 207
» Broadcasting with Selective Reduction
Sort
View
CHES
2003
Springer
100views Cryptology» more  CHES 2003»
14 years 3 months ago
Multi-channel Attacks
We introduce multi-channel attacks, i.e., side-channel attacks which utilize multiple side-channels such as power and EM simultaneously. We propose an adversarial model which combi...
Dakshi Agrawal, Josyula R. Rao, Pankaj Rohatgi
DATE
2010
IEEE
180views Hardware» more  DATE 2010»
14 years 3 months ago
A reconfigurable cache memory with heterogeneous banks
Abstract— The optimal size of a large on-chip cache can be different for different programs: at some point, the reduction of cache misses achieved when increasing cache size hits...
Domingo Benitez, Juan C. Moure, Dolores Rexachs, E...
ATS
2002
IEEE
94views Hardware» more  ATS 2002»
14 years 3 months ago
Non-Intrusive Design of Concurrently Self-Testable FSMs
We propose a methodology for non-intrusive design of concurrently self-testable FSMs. Unlike duplication schemes, wherein a replica of the original FSM acts as a predictor-compara...
Petros Drineas, Yiorgos Makris
METRICS
2002
IEEE
14 years 3 months ago
What We Have Learned About Fighting Defects
The Center for Empirically Based Software Engineering helps improve software development by providing guidelines for selecting development techniques, recommending areas for furth...
Forrest Shull, Victor R. Basili, Barry W. Boehm, A...
EMMCVPR
2001
Springer
14 years 2 months ago
Designing the Minimal Structure of Hidden Markov Model by Bisimulation
Hidden Markov Models (HMMs) are an useful and widely utilized approach to the modeling of data sequences. One of the problems related to this technique is finding the optimal stru...
Manuele Bicego, Agostino Dovier, Vittorio Murino