Sciweavers

2945 search results - page 40 / 589
» Designing and Implementing Malicious Hardware
Sort
View
TVLSI
2008
140views more  TVLSI 2008»
15 years 3 months ago
A Novel Mutation-Based Validation Paradigm for High-Level Hardware Descriptions
We present a Mutation-based Validation Paradigm (MVP) technology that can handle complete high-level microprocessor implementations and is based on explicit design error modeling, ...
Jorge Campos, Hussain Al-Asaad
DAC
2008
ACM
16 years 5 months ago
Formal datapath representation and manipulation for implementing DSP transforms
We present a domain-specific approach to representing datapaths for hardware implementations of linear signal transform algorithms. We extend the tensor structure for describing l...
Franz Franchetti, James C. Hoe, Markus Püsche...
CISIS
2009
IEEE
15 years 10 months ago
A Lightweight Implementation of Trusted Domain Enforcement for Secure Embedded Web Server
—Deployment of open source software for embedded system is increasing while ubiquitous devices have become widely used. System designer need to cope with malicious input which is...
Ruo Ando
106
Voted
DAC
1998
ACM
16 years 5 months ago
Design and Implementation of the NUMAchine Multiprocessor
This paper describes the design and implementation of the NUMAchine multiprocessor. As the market for CC-NUMA multiprocessors expands, this research project provides a timely arch...
A. Grbic, Stephen Dean Brown, S. Caranci, R. Grind...
ASAP
2009
IEEE
120views Hardware» more  ASAP 2009»
16 years 1 months ago
Design and Implementation of a Radix-4 Complex Division Unit with Prescaling
—We present a design and implementation of a radix-4 complex division unit with prescaling of the operands. Specifically, we extend the treatment of the residual bound and error...
Pouya Dormiani, Milos D. Ercegovac, Jean-Michel Mu...