Sciweavers

1799 search results - page 307 / 360
» Design considerations for MRAM
Sort
View
EUROCRYPT
2003
Springer
15 years 9 months ago
A Theoretical Treatment of Related-Key Attacks: RKA-PRPs, RKA-PRFs, and Applications
ded abstract of this paper appears in Advances in Cryptology – EUROCRYPT ’03, Lecture Notes in Computer Science Vol. 2656, E. Biham ed., Springer-Verlag, 2003. This is the full...
Mihir Bellare, Tadayoshi Kohno
ISCA
2010
IEEE
170views Hardware» more  ISCA 2010»
15 years 9 months ago
Relax: an architectural framework for software recovery of hardware faults
As technology scales ever further, device unreliability is creating excessive complexity for hardware to maintain the illusion of perfect operation. In this paper, we consider whe...
Marc de Kruijf, Shuou Nomura, Karthikeyan Sankaral...
HICSS
2002
IEEE
78views Biometrics» more  HICSS 2002»
15 years 9 months ago
What Is Effective GSS Facilitation? A Qualitative Inquiry into Participants' Perceptions
Facilitation in GSS meetings is considered among the most important critical success factors for effective GSS application. A considerable amount of research on GSS facilitation h...
Gert-Jan de Vreede, Jessica Boonstra, Fred Niederm...
158
Voted
ICRA
2002
IEEE
136views Robotics» more  ICRA 2002»
15 years 9 months ago
Motion Dynamics of a Rover with Slip-Based Traction Model
This paper investigates kinetic behavior of a planetary rover with attention to tire-soil traction mechanics and articulated body dynamics, and thereby study the control when the ...
Kazuya Yoshida, Hiroshida Hamano
VLDB
2001
ACM
109views Database» more  VLDB 2001»
15 years 8 months ago
Analyzing energy behavior of spatial access methods for memory-resident data
The proliferation of mobile and pervasive computing devices has brought energy constraints into the limelight, together with performance considerations. Energy-conscious design is...
Ning An, Anand Sivasubramaniam, Narayanan Vijaykri...