Sciweavers

2945 search results - page 136 / 589
» Designing and Implementing Malicious Hardware
Sort
View
MSS
2000
IEEE
160views Hardware» more  MSS 2000»
15 years 9 months ago
Implementation of a Fault-Tolerant Real-Time Network-Attached Storage Device
Phoenix is a fault-tolerantreal-time network-attachedstorage device (NASD). Like other NASD architectures, Phoenix provides an object-based interface to data stored on network-att...
Ashish Raniwala, Srikant Sharma, Anindya Neogi, Tz...
CIT
2004
Springer
15 years 10 months ago
FPGA Based Implementation of an Invisible-Robust Image Watermarking Encoder
Abstract. Both encryption and digital watermarking techniques need to be incorporated in a digital rights management framework to address different aspects of content management. W...
Saraju P. Mohanty, Renuka Kumara C., Sridhara Naya...
ETT
2002
76views Education» more  ETT 2002»
15 years 4 months ago
Development and implementation of an advanced airport data link based on multi-carrier communications
In this paper, both the concept and the demonstrator implementation of an advanced airport data link is described which is used for data exchange between pilots and controllers in ...
Erik Haas, Helmuth Lang, Michael Schnell
IPPS
2003
IEEE
15 years 10 months ago
Performance Monitoring and Evaluation of a UPC Implementation on a NUMA Architecture
UPC is an explicit parallel extension of ANSI C, which has been gaining rising attention from vendors and users. In this work, we consider the low-level monitoring and experimenta...
François Cantonnet, Yiyi Yao, Smita Annared...
FPL
2003
Springer
164views Hardware» more  FPL 2003»
15 years 10 months ago
FPGA Implementations of the RC6 Block Cipher
RC6 is a symmetric-key algorithm which encrypts 128-bit plaintext blocks to 128-bit ciphertext blocks. The encryption process involves four operations: integer addition modulo 2w ,...
Jean-Luc Beuchat