Sciweavers

2206 search results - page 98 / 442
» On the power of coercion abstraction
Sort
View
FDTC
2006
Springer
117views Cryptology» more  FDTC 2006»
14 years 19 days ago
DPA on Faulty Cryptographic Hardware and Countermeasures
Abstract. Balanced gates are an effective countermeasure against power analysis attacks only if they can be guaranteed to maintain their power balance. Traditional testing and reli...
Konrad J. Kulikowski, Mark G. Karpovsky, Alexander...
CSE
2009
IEEE
14 years 8 days ago
Energy Consumption of Residential and Professional Switches
Abstract—Precise evaluation of network appliance energy consumption is necessary to accurately model or simulate the power consumption of distributed systems. In this paper we ev...
Helmut Hlavacs, Georges Da Costa, Jean-Marc Pierso...
STAIRS
2008
128views Education» more  STAIRS 2008»
13 years 10 months ago
Towards Social Dynamic Dependence Networks for Institutions
Social networks are structures that aim to represent the relationships among the actors of a society. In the multiagent model, these networks depict the dependencies among the agen...
Serena Villata
TWC
2008
117views more  TWC 2008»
13 years 8 months ago
Achievable Rates and Fairness in Rateless Coded Relaying Schemes
Abstract--The average throughput of three decode-andforward (DF) half-duplex (DFHD) and two DF full-duplex (DFFD) rateless coded relaying schemes are studied under a peak power con...
Reza Nikjah, Norman C. Beaulieu
TVLSI
2002
100views more  TVLSI 2002»
13 years 8 months ago
Architectural strategies for low-power VLSI turbo decoders
Abstract--The use of "turbo codes" has been proposed for several applications, including the development of wireless systems, where highly reliable transmission is requir...
Guido Masera, M. Mazza, Gianluca Piccinini, F. Vig...