Sciweavers

222 search results - page 17 / 45
» Performance Impact of Addressing Modes on Encryption Algorit...
Sort
View
DCC
2008
IEEE
14 years 7 months ago
Drift Characterization of Intra Prediction and Quantization in H.264
The combination of intra prediction, transform, and quantization in the H.264/AVC video coding standard offers high compression performance in picture areas where inter prediction...
Athanasios Leontaris, Alexis M. Tourapis
MTV
2007
IEEE
121views Hardware» more  MTV 2007»
14 years 2 months ago
Chico: An On-chip Hardware Checker for Pipeline Control Logic
The widening gap between CPU complexity and verification capability is becoming increasingly more salient. It is impossible to completely verify the functionality of a modern mic...
Andrew DeOrio, Adam Bauserman, Valeria Bertacco
ACMSE
2004
ACM
14 years 1 months ago
A framework for trusted instruction execution via basic block signature verification
Most of today’s computers are connected to the Internet or at least to a local network, exposing system vulnerabilities to the potential attackers. One of the attackers’ goals...
Milena Milenkovic, Aleksandar Milenkovic, Emil Jov...
CARDIS
2006
Springer
187views Hardware» more  CARDIS 2006»
13 years 11 months ago
Low-Cost Cryptography for Privacy in RFID Systems
Massively deploying RFID systems while preserving people's privacy and data integrity is a major security challenge of the coming years. Up to now, it was commonly believed th...
Benoît Calmels, Sébastien Canard, Mar...
JCP
2007
148views more  JCP 2007»
13 years 7 months ago
P3ARM-t: Privacy-Preserving Protocol for Association Rule Mining with t Collusion Resistance
— The ability to mine large volumes of distributed datasets enables more precise decision making. However, privacy concerns should be carefully addressed when mining datasets dis...
Iman Saleh, Mohamed Eltoweissy