Sciweavers

1711 search results - page 99 / 343
» Completing pseudojump operators
Sort
View
IPPS
2000
IEEE
14 years 12 days ago
Memory Management in a Combined VIA/SCI Hardware
Abstract In this document we make a brief review of memory management and DMA considerations in case of common SCI hardware and the Virtual Interface Architecture. On this basis we...
Mario Trams, Wolfgang Rehm, Daniel Balkanski, Stan...
MTDT
2000
IEEE
137views Hardware» more  MTDT 2000»
14 years 12 days ago
Diagnostic Testing of Embedded Memories Based on Output Tracing
A new approach to diagnostic testing of embedded memories is presented which enables the design of tests that provide complete detection and distinguishing of all faults in a give...
Dirk Niggemeyer, Elizabeth M. Rudnick, Michael Red...
SIGCOMM
2000
ACM
14 years 11 days ago
Practical network support for IP traceback
This paper describes a technique for tracing anonymous packet flooding attacks in the Internet back towards their source. This work is motivated by the increased frequency and so...
Stefan Savage, David Wetherall, Anna R. Karlin, Th...
CHES
2000
Springer
135views Cryptology» more  CHES 2000»
14 years 11 days ago
Protecting Smart Cards from Passive Power Analysis with Detached Power Supplies
Power analysis is a very successful cryptanalytic technique which extracts secret information from smart cards by analysing the power consumed during the execution of their interna...
Adi Shamir
AROBOTS
1999
93views more  AROBOTS 1999»
13 years 7 months ago
A Robotic Excavator for Autonomous Truck Loading
Excavators are used for the rapid removal of soil and other materials in mines, quarries, and construction sites. The automation of these machines offers promise for increasing pro...
Anthony Stentz, John Bares, Sanjiv Singh, Patrick ...