Sciweavers

864 search results - page 103 / 173
» New Strategies for System-Level Design
Sort
View
HOST
2008
IEEE
15 years 10 months ago
Detecting Malicious Inclusions in Secure Hardware: Challenges and Solutions
This paper addresses a new threat to the security of integrated circuits (ICs) used in safety critical, security and military systems. The migration of IC fabrication to low-cost ...
Xiaoxiao Wang, Mohammad Tehranipoor, Jim Plusquell...
MHCI
2007
Springer
15 years 10 months ago
Co-present photo sharing on mobile devices
The paper reports a mobile application that allows users to share photos with other co-present users by synchronizing the display on multiple mobile devices. Various floor control...
Leonard Martin Ah Kun, Gary Marsden
GLVLSI
2006
IEEE
193views VLSI» more  GLVLSI 2006»
15 years 10 months ago
Optimizing noise-immune nanoscale circuits using principles of Markov random fields
As CMOS devices and operating voltages are scaled down, noise and defective devices will impact the reliability of digital circuits. Probabilistic computing compatible with CMOS o...
Kundan Nepal, R. Iris Bahar, Joseph L. Mundy, Will...
FPL
2005
Springer
140views Hardware» more  FPL 2005»
15 years 9 months ago
A Configuration Memory Architecture for Fast Run-Time-Reconfiguration of FPGAs
This paper presents a configuration memory architecture that offers fast FPGA reconfiguration. The underlying principle behind the design is the use of fine-grained partial rec...
Usama Malik, Oliver Diessel
IPPS
2003
IEEE
15 years 9 months ago
Anonymous Publish/Subscribe in P2P Networks
One of the most important issues to deal with in peerto-peer networks is how to disseminate information. In this paper, we use a completely new approach to solving the information...
Ajoy Kumar Datta, Maria Gradinariu, Michel Raynal,...