Sciweavers

2048 search results - page 346 / 410
» Optimizing pipelines for power and performance
Sort
View
CHES
2006
Springer
111views Cryptology» more  CHES 2006»
13 years 11 months ago
Cache-Collision Timing Attacks Against AES
This paper describes several novel timing attacks against the common table-driven software implementation of the AES cipher. We define a general attack strategy using a simplified ...
Joseph Bonneau, Ilya Mironov
VIIP
2001
13 years 9 months ago
Using Graphics Cards for Quantized FEM Computations
Graphics cards exercise increasingly more computing power and are highly optimized for high data transfer volumes. In contrast typical workstations perform badly when data exceeds...
Martin Rumpf, Robert Strzodka
JSAC
2008
164views more  JSAC 2008»
13 years 7 months ago
Coordinated beamforming with limited feedback in the MIMO broadcast channel
In this paper, we propose a new joint optimization of linear transmit beamforming and receive combining vectors for the multiple-input multiple-output (MIMO) broadcast channel. We ...
Chan-Byoung Chae, David Mazzarese, Nihar Jindal, R...
TWC
2008
118views more  TWC 2008»
13 years 7 months ago
Electromagnetic considerations for communicating on correlated MIMO channels with covariance information
Previous results for correlated block-fading MIMO channels with covariance information indicate guaranteed capacity growth with additional transmit elements and that in rapidly fa...
Jon W. Wallace, Michael A. Jensen
PIMRC
2008
IEEE
14 years 2 months ago
Network-Assisted Wireless Computing
Abstract—Multimedia applications for mobile devices are increasing and growing more sophisticated. Many of these applications require computationally intensive processing, such a...
Carri W. Chan, Nicholas Bambos, Jatinder Pal Singh