Sciweavers

2945 search results - page 62 / 589
» Designing and Implementing Malicious Hardware
Sort
View
VTS
2002
IEEE
128views Hardware» more  VTS 2002»
15 years 9 months ago
Power Supply Transient Signal Analysis Under Real Process and Test Hardware Models
A device testing method called Transient Signal Analysis (TSA) is subjected to elements of a real process and testing environment in this paper. Simulations experiments are design...
Abhishek Singh, Jim Plusquellic, Anne E. Gattiker
FPGA
2006
ACM
98views FPGA» more  FPGA 2006»
15 years 7 months ago
A reconfigurable hardware based embedded scheduler for buffered crossbar switches
In this paper, we propose a new internally buffered crossbar (IBC) switching architecture where the input and output distributed schedulers are embedded inside the crossbar fabric...
Lotfi Mhamdi, Christopher Kachris, Stamatis Vassil...
ASAP
2008
IEEE
182views Hardware» more  ASAP 2008»
15 years 10 months ago
Low-cost implementations of NTRU for pervasive security
NTRU is a public-key cryptosystem based on the shortest vector problem in a lattice which is an alternative to RSA and ECC. This work presents a compact and low power NTRU design ...
Ali Can Atici, Lejla Batina, Junfeng Fan, Ingrid V...
DATE
2005
IEEE
162views Hardware» more  DATE 2005»
15 years 9 months ago
A Model-Based Approach for Executable Specifications on Reconfigurable Hardware
UML 2.0 provides a rich set of diagrams for systems documentation and specification. Many efforts have been undertaken to employ different aspects of UML for multiple domains, mai...
Tim Schattkowsky, Wolfgang Müller 0003, Achim...
DAGSTUHL
2004
15 years 5 months ago
SHIM: A Language for Hardware/Software Integration
Virtually every system designed today is an amalgam of hardware and software. Unfortunately, software and circuits that communicate across the hardware/software boundary are tedio...
Stephen A. Edwards