Sciweavers

2945 search results - page 128 / 589
» Designing and Implementing Malicious Hardware
Sort
View
MSE
2003
IEEE
102views Hardware» more  MSE 2003»
15 years 10 months ago
Introducing The Concept Of Design Reuse Into Undergraduate Digital Design Curriculum
Intellectual property (IP) reuse based system design is becoming an industry standard recently. However, current educational system is not effective in the training of engineers ...
Gang Qu
ISCAS
2006
IEEE
100views Hardware» more  ISCAS 2006»
15 years 10 months ago
Power system on a chip (PSoC)
— This paper addresses modeling issues behind the development of a hardware analog emulator of power system behavior referred to as a Power System on a Chip (PSoC). The paper wil...
Chika O. Nwankpa, A. S. Deese, Qingyan Liu, Aaron ...
ISCAS
2003
IEEE
116views Hardware» more  ISCAS 2003»
15 years 10 months ago
Using FPGAs to solve the Hamiltonian cycle problem
The Hamiltonian Cycle (HC) problem is an important graph problem with many applications. The general backtracking algorithm normally used for random graphs often takes far too lon...
Micaela Serra, Kenneth B. Kent
DATE
2006
IEEE
128views Hardware» more  DATE 2006»
15 years 8 months ago
Platform-based design of wireless sensor networks for industrial applications
We present a methodology, an environment and supporting tools to map an application on a wireless sensor network (WSN). While the method is quite general, we use extensively an exa...
Alvise Bonivento, Luca P. Carloni, Alberto L. Sang...
SACRYPT
2000
Springer
145views Cryptology» more  SACRYPT 2000»
15 years 8 months ago
Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms - Design and Analysis
We present a new 128-bit block cipher called Camellia. Camellia supports 128-bit block size and 128-, 192-, and 256-bit keys, i.e. the same interface specifications as the Advanced...
Kazumaro Aoki, Tetsuya Ichikawa, Masayuki Kanda, M...