Sciweavers

2253 search results - page 336 / 451
» Computing with Realizational Morphology
Sort
View
PKC
2009
Springer
240views Cryptology» more  PKC 2009»
16 years 5 months ago
Distributed Public-Key Cryptography from Weak Secrets
Abstract.We introduce the notion of distributed password-based publickey cryptography, where a virtual high-entropy private key is implicitly dened as a concatenation of low-entrop...
Céline Chevalier, David Pointcheval, Michel...
VLSID
2006
IEEE
119views VLSI» more  VLSID 2006»
16 years 4 months ago
Performance and Energy Benefits of Instruction Set Extensions in an FPGA Soft Core
Performance of applications can be boosted by executing application-specific Instruction Set Extensions (ISEs) on a specialized hardware coupled with a processor core. Many commer...
Partha Biswas, Sudarshan Banerjee, Nikil D. Dutt, ...
VLSID
2002
IEEE
149views VLSI» more  VLSID 2002»
16 years 4 months ago
Functional Partitioning for Low Power Distributed Systems of Systems-on-a-Chip
In this paper, we present a functional partitioning method for low power real-time distributed embedded systems whose constituent nodes are systems-on-a-chip (SOCs). The systemlev...
Yunsi Fei, Niraj K. Jha
VLSID
2002
IEEE
115views VLSI» more  VLSID 2002»
16 years 4 months ago
Logic Synthesis for AND-XOR-OR Type Sense-Amplifying PLA
In this paper, a new logic synthesis method for an AND-XOR-OR type sense-amplifying PLA is proposed. An AND-XOR-OR type sense-amplifying PLA can achieve lowpower dissipation and h...
Hiroaki Yoshida, Hiroaki Yamaoka, Makoto Ikeda, Ku...
SIGMOD
2004
ACM
101views Database» more  SIGMOD 2004»
16 years 4 months ago
UbiData: Requirements and Architecture for Ubiquitous Data Access
Mobile users today demand ubiquitous access to their data from any mobile device and under variable connection quality. We refer to this requirement as any-time, any-where data ac...
Abdelsalam Helal, Joachim Hammer