Sciweavers

1856 search results - page 334 / 372
» Phoning it in
Sort
View
DATE
2007
IEEE
157views Hardware» more  DATE 2007»
14 years 3 months ago
Energy evaluation of software implementations of block ciphers under memory constraints
Software implementations of modern block ciphers often require large lookup tables along with code size increasing optimizations like loop unrolling to reach peak performance on g...
Johann Großschädl, Stefan Tillich, Chri...
ECRTS
2007
IEEE
14 years 3 months ago
Cache-Aware Timing Analysis of Streaming Applications
Of late, there has been a considerable interest in models, algorithms and methodologies specifically targeted towards designing hardware and software for streaming applications. ...
Samarjit Chakraborty, Tulika Mitra, Abhik Roychoud...
GRC
2007
IEEE
14 years 3 months ago
Towards Mobile Internet: Location Privacy Threats and Granular Computation Challenges
The bulk of contents out on the Internet continue to grow at an astounding pace. As computing and communications become ubiquitous, we are entering the Mobile Internet Computing e...
Ling Liu
IROS
2007
IEEE
142views Robotics» more  IROS 2007»
14 years 3 months ago
GPS moving performance on open sky and forested paths
— In this paper we present a systematic study of the performance of seven different configurations of GPS on a moving vehicle using three different GPS receivers. The seven diff...
Luis Yoichi Morales Saiki, Takashi Tsubouchi
MOBIQUITOUS
2007
IEEE
14 years 3 months ago
TRULLO - local trust bootstrapping for ubiquitous devices
—Handheld devices have become sufficiently powerful that it is easy to create, disseminate, and access digital content (e.g., photos, videos) using them. The volume of such cont...
Daniele Quercia, Stephen Hailes, Licia Capra