Sciweavers

2945 search results - page 118 / 589
» Designing and Implementing Malicious Hardware
Sort
View
ISCAS
2007
IEEE
222views Hardware» more  ISCAS 2007»
15 years 11 months ago
A Greedy Common Subexpression Elimination Algorithm for Implementing FIR Filters
— The complexity of Finite Impulse Response (FIR) filters is dominated by the number of adders (subtractors) used to implement the coefficient multipliers. A greedy Common Subexp...
S. Vijay, A. Prasad Vinod, Edmund Ming-Kit Lai
118
Voted
AFRICACRYPT
2008
Springer
15 years 11 months ago
Implementation of the AES-128 on Virtex-5 FPGAs
Abstract. This paper presents an updated implementation of the Advanced Encryption Standard (AES) on the recent Xilinx Virtex-5 FPGAs. We show how a modified slice structure in th...
Philippe Bulens, François-Xavier Standaert,...
ISCAS
2005
IEEE
154views Hardware» more  ISCAS 2005»
15 years 10 months ago
Analog CMOS implementation of a neuromorphic oscillator with current-mode low-pass filters
We propose an analog current-mode subthreshold CMOS circuit implementing a neuromorphic oscillator. Our circuit is based on the half-center oscillator model proposed by Matsuoka, ...
Kazuki Nakada, Tetsuya Asai, Yoshihito Amemiya
APCSAC
2000
IEEE
15 years 9 months ago
Cost/Performance Tradeoff of n-Select Square Root Implementations
Hardware square-root units require large numbers of gates even for iterative implementations. In this paper, we present four low-cost high-performance fullypipelined n-select impl...
Wanming Chu, Yamin Li
WCNC
2010
IEEE
15 years 8 months ago
Experiences and Lessons from Implementing a Wireless Sensor Network MAC Protocol in the Castalia Simulator
—We describe our experience from the implementation of the T-MAC protocol for wireless sensor networks in the open-source Castalia simulator. Notwithstanding the popularity of th...
Yuri Tselishchev, Athanassios Boulis, Lavy Libman