Sciweavers

3883 search results - page 73 / 777
» Design mentoring based on design evolution analysis
Sort
View
JDCTA
2010
175views more  JDCTA 2010»
13 years 2 months ago
Evolution Cipher against Differential Power Attack
: Differntial Power Attack (DPA) is one kind of Side Channel Attacks (SCAs). There are two phases in DPA attacks: sample collection and statistical analysis, which can be utilized ...
Shubo Liu, Ming Tang, Si Gao, Huanguo Zhang
ER
2006
Springer
102views Database» more  ER 2006»
13 years 11 months ago
Notes for the Conceptual Design of Interfaces
This paper presents a design method for user interfaces based on some ideas from conversation analysis. The method uses interaction diagram and it is conceived to design all flow ...
Simone Santini
ASPDAC
2005
ACM
89views Hardware» more  ASPDAC 2005»
14 years 1 months ago
Multi-metric and multi-entity characterization of applications for early system design exploration
— At system level, intensively analyzing the system application will produce a variety of useful characteristics and provide designers valuable exploration indications. In this p...
Lukai Cai, Andreas Gerstlauer, Daniel Gajski
ICCAD
1996
IEEE
95views Hardware» more  ICCAD 1996»
13 years 12 months ago
Semi-analytical techniques for substrate characterization in the design of mixed-signal ICs
A number of methods are presentedfor highly efficient calculation of substratecurrenttransport. A three-dimensionalGreen'sFunction based substrate representation, in combinat...
Edoardo Charbon, Ranjit Gharpurey, Alberto L. Sang...
BPM
2006
Springer
166views Business» more  BPM 2006»
13 years 11 months ago
Process Mining by Measuring Process Block Similarity
Mining, discovering, and integrating process-oriented services has attracted growing attention in the recent year. Workflow precedence graph and workflow block structures are two i...
Joonsoo Bae, James Caverlee, Ling Liu, Hua Yan