Sciweavers

671 search results - page 21 / 135
» Computer Aided Modelling Exercises
Sort
View
DAC
2006
ACM
14 years 3 months ago
Modeling and minimization of PMOS NBTI effect for robust nanometer design
Negative bias temperature instability (NBTI) has become the dominant reliability concern for nanoscale PMOS transistors. In this paper, a predictive model is developed for the deg...
Rakesh Vattikonda, Wenping Wang, Yu Cao
EUROCRYPT
2007
Springer
14 years 4 months ago
Secure Computation from Random Error Correcting Codes
Abstract. Secure computation consists of protocols for secure arithmetic: secret values are added and multiplied securely by networked processors. The striking feature of secure co...
Hao Chen, Ronald Cramer, Shafi Goldwasser, Robbert...
SAFECOMP
2005
Springer
14 years 3 months ago
Public-Key Cryptography and Availability
When the safety community designs their systems to also maintain security properties, it is likely that public-key encryption will be among the tools that are applied. The security...
Tage Stabell-Kulø, Simone Lupetti
IPPS
2006
IEEE
14 years 3 months ago
A framework to develop symbolic performance models of parallel applications
Performance and workload modeling has numerous uses at every stage of the high-end computing lifecycle: design, integration, procurement, installation and tuning. Despite the trem...
Sadaf R. Alam, Jeffrey S. Vetter
ETS
2002
IEEE
139views Hardware» more  ETS 2002»
13 years 9 months ago
Automated Tutorial and Assignment Assessment
Computer simulation is used extensively both as an educational tool and within industry. It can be employed as a means of developing a new process or system or as a means of exper...
Roger F. Browne