Sciweavers

987 search results - page 140 / 198
» Implementing an untrusted operating system on trusted hardwa...
Sort
View
ISCAS
2005
IEEE
114views Hardware» more  ISCAS 2005»
14 years 2 months ago
Self-organized cortical map formation by guiding connections
We describe an algorithm for self-organizing connections from a source array to a target array of neurons that is inspired by neural growth cone guidance. Each source neuron proje...
Stanley Y. M. Lam, Bertram Emil Shi, Kwabena Boahe...
SAMOS
2007
Springer
14 years 3 months ago
High-Bandwidth Address Generation Unit
In this paper we describe an efficient data fetch circuitry for retrieving several operands from a n-bank interleaved memory system in a single machine cycle. The proposed address ...
Humberto Calderon, Carlo Galuzzi, Georgi Gaydadjie...
ISCAS
2003
IEEE
69views Hardware» more  ISCAS 2003»
14 years 2 months ago
A modular sensor microsystem utilizing a universal interface circuit
The performance features of MEMS transducers allow the development of a new class of small, low-power sensor microsystems which utilize a suite of sensors to support a wide range ...
Andrew Mason, N. Yazdi, J. Zhang, Z. Sainudeen
APCSAC
2001
IEEE
14 years 16 days ago
High-Performance Extendable Instruction Set Computing
In this paper, a new architecture called the extendable instruction set computer (EISC) is introduced that addresses the issues of memory size and performance in embedded micropro...
Heui Lee, Paul Becket, Bill Appelbe
ESORICS
2008
Springer
13 years 10 months ago
CPU Bugs, CPU Backdoors and Consequences on Security
In this paper, we present the security implications of x86 processor bugs or backdoors on operating systems and virtual machine monitors. We will not try to determine whether the b...
Loïc Duflot