Sciweavers

52 search results - page 4 / 11
» On the effectiveness of the metamorphic shield
Sort
View
DAC
2011
ACM
12 years 6 months ago
Full-chip TSV-to-TSV coupling analysis and optimization in 3D IC
This paper studies TSV-to-TSV coupling in 3D ICs. A full-chip SI analysis flow is proposed based on the proposed coupling model. Analysis results show that TSVs cause significan...
Chang Liu, Taigon Song, Jonghyun Cho, Joohee Kim, ...
DATE
2010
IEEE
123views Hardware» more  DATE 2010»
13 years 11 months ago
Interconnect delay and slew metrics using the beta distribution
—Integrated circuit process technology is entering the ultra deep submicron era. At this level, interconnect structure becomes very stiff and the metal resistance shielding effec...
Jun-Kuei Zeng, Chung-Ping Chen
FPL
2007
Springer
141views Hardware» more  FPL 2007»
14 years 26 days ago
Analysis of Kernel Effects on Optimisation Mismatch in Cache Reconfiguration
The effect of kernel operations on cache optimisations in a soft-core reconfigurable system is important for dynamic cache switching design. Considering kernel operations changes ...
John Shield, Peter Sutton, Philip Machanick
AI
2007
Springer
14 years 27 days ago
Adding Local Constraints to Bayesian Networks
When using Bayesian networks, practitioners often express constraints among variables by conditioning a common child node to induce the desired distribution. For example, an ‘or...
Mark Crowley, Brent Boerlage, David Poole
ACSAC
2010
IEEE
13 years 4 months ago
Comprehensive shellcode detection using runtime heuristics
A promising method for the detection of previously unknown code injection attacks is the identification of the shellcode that is part of the attack vector using payload execution....
Michalis Polychronakis, Kostas G. Anagnostakis, Ev...