Sciweavers

2945 search results - page 141 / 589
» Designing and Implementing Malicious Hardware
Sort
View
MICRO
1997
IEEE
110views Hardware» more  MICRO 1997»
15 years 9 months ago
The Design and Performance of a Conflict-Avoiding Cache
High performance architectures depend heavily on efficient multi-level memory hierarchies to minimize the cost of accessing data. This dependence will increase with the expected i...
Nigel P. Topham, Antonio González, Jos&eacu...
DATE
2008
IEEE
140views Hardware» more  DATE 2008»
15 years 11 months ago
FPGA Design for Algebraic Tori-Based Public-Key Cryptography
Algebraic torus-based cryptosystems are an alternative for Public-Key Cryptography (PKC). It maintains the security of a larger group while the actual computations are performed i...
Junfeng Fan, Lejla Batina, Kazuo Sakiyama, Ingrid ...
DATE
2006
IEEE
151views Hardware» more  DATE 2006»
15 years 10 months ago
Designing MRF based error correcting circuits for memory elements
As devices are scaled to the nanoscale regime, it is clear that future nanodevices will be plagued by higher soft error rates and reduced noise margins. Traditional implementation...
Kundan Nepal, R. Iris Bahar, Joseph L. Mundy, Will...
CODES
1998
IEEE
15 years 9 months ago
Communication synthesis and HW/SW integration for embedded system design
The implementation of codesign applications generally requires the use of heterogeneous resources (e.g., processor cores, hardware accelerators) in one system. Interfacing hardwar...
Guy Gogniat, Michel Auguin, Luc Bianco, Alain Pega...
FPL
2010
Springer
105views Hardware» more  FPL 2010»
15 years 2 months ago
Reconfigurable Control Variate Monte-Carlo Designs for Pricing Exotic Options
Exotic options are financial derivatives which have complex features including path-dependency. These complex features make them difficult to price, as only computationally intensi...
Anson H. T. Tse, David B. Thomas, Kuen Hung Tsoi, ...