Sciweavers

825 search results - page 42 / 165
» Internal Iteration Externalized
Sort
View
ISLPED
2006
ACM
99views Hardware» more  ISLPED 2006»
14 years 2 months ago
Independent front-end and back-end dynamic voltage scaling for a GALS microarchitecture
In recent years, Globally Asynchronous Locally Synchronous (GALS) designs and dynamic voltage scaling (DVS) have emerged as some of the most popular approaches to address the ever...
Grigorios Magklis, Pedro Chaparro, José Gon...
DATE
2005
IEEE
109views Hardware» more  DATE 2005»
14 years 1 months ago
Design Method for Constant Power Consumption of Differential Logic Circuits
Side channel attacks are a major security concern for smart cards and other embedded devices. They analyze the variations on the power consumption to find the secret key of the en...
Kris Tiri, Ingrid Verbauwhede
DALT
2004
Springer
14 years 1 months ago
Representational Content and the Reciprocal Interplay of Agent and Environment
Declarative modelling approaches in principle assume a notion of representation or representational content for the modelling concepts. The notion of representational content as di...
Tibor Bosse, Catholijn M. Jonker, Jan Treur
ECAL
2003
Springer
14 years 1 months ago
Multi-agent Model of Biological Swarming
An agent-based approach is used to explain the formation of vortex swarms in biological systems. The dynamics of the multiagent system is described by 3N coupled equations, modeli...
Robert Mach, Frank Schweitzer
CHES
2000
Springer
135views Cryptology» more  CHES 2000»
14 years 11 days ago
Protecting Smart Cards from Passive Power Analysis with Detached Power Supplies
Power analysis is a very successful cryptanalytic technique which extracts secret information from smart cards by analysing the power consumed during the execution of their interna...
Adi Shamir