Sciweavers

24 search results - page 3 / 5
» Minimizing information leakage in the DNS
Sort
View
ASIACRYPT
2005
Springer
14 years 18 days ago
Revealing Additional Information in Two-Party Computations
Abstract. A two-argument function is computed privately by two parties if after the computation, no party should know anything about the other inputs except for what he is able to ...
Andreas Jakoby, Maciej Liskiewicz
ICCAD
2007
IEEE
124views Hardware» more  ICCAD 2007»
14 years 4 months ago
Timing budgeting under arbitrary process variations
Timing budgeting under process variations is an important step in a statistical optimization flow. We propose a novel formulation of the problem where budgets are statistical ins...
Ruiming Chen, Hai Zhou
CODES
2006
IEEE
14 years 1 months ago
Thermal-aware high-level synthesis based on network flow method
Lowering down the chip temperature is becoming one of the important design considerations, since temperature adversely and seriously affects many of design qualities, such as reli...
Pilok Lim, Taewhan Kim
ACSAC
2006
IEEE
14 years 1 months ago
Covert and Side Channels Due to Processor Architecture
Information leakage through covert channels and side channels is becoming a serious problem, especially when these are enhanced by modern processor architecture features. We show ...
Zhenghong Wang, Ruby B. Lee
TASLP
2002
142views more  TASLP 2002»
13 years 6 months ago
Geometric source separation: merging convolutive source separation with geometric beamforming
Convolutive blind source separation and adaptive beamforming have a similar goal--extracting a source of interest (or multiple sources) while reducing undesired interferences. A be...
Lucas C. Parra, Christopher V. Alvino