Sciweavers

96 search results - page 12 / 20
» How Fast Can Higher-Order Masking Be in Software
Sort
View
159
Voted
IMA
2009
Springer
221views Cryptology» more  IMA 2009»
15 years 10 months ago
Cache Timing Analysis of LFSR-Based Stream Ciphers
Cache timing attacks are a class of side-channel attacks that is applicable against certain software implementations. They have generated significant interest when demonstrated ag...
Gregor Leander, Erik Zenner, Philip Hawkes
154
Voted
TCAD
2008
167views more  TCAD 2008»
15 years 3 months ago
System-Level Dynamic Thermal Management for High-Performance Microprocessors
Abstract--Thermal issues are fast becoming major design constraints in high-performance systems. Temperature variations adversely affect system reliability and prompt worst-case de...
Amit Kumar 0002, Li Shang, Li-Shiuan Peh, Niraj K....
ICSE
2007
IEEE-ACM
16 years 3 months ago
OPIUM: Optimal Package Install/Uninstall Manager
Linux distributions often include package management tools such as apt-get in Debian or yum in RedHat. Using information about package dependencies and conflicts, such tools can d...
Chris Tucker, David Shuffelton, Ranjit Jhala, Sori...
164
Voted
ISPASS
2009
IEEE
15 years 10 months ago
Accurately approximating superscalar processor performance from traces
Trace-driven simulation of superscalar processors is particularly complicated. The dynamic nature of superscalar processors combined with the static nature of traces can lead to l...
Kiyeon Lee, Shayne Evans, Sangyeun Cho
114
Voted
ECEH
2006
168views Healthcare» more  ECEH 2006»
15 years 5 months ago
Building a Smart Hospital using RFID Technologies
: Technologies of identification by radio frequencies (RFID) experience a fast development and healthcare is predicted to be one of its major growth areas. After briefly introducin...
Patrik Fuhrer, Dominique Guinard