Sciweavers

79 search results - page 11 / 16
» Place and Route for Secure Standard Cell Design
Sort
View
CADE
2011
Springer
12 years 6 months ago
Deciding Security for Protocols with Recursive Tests
Abstract. Security protocols aim at securing communications over public networks. Their design is notoriously difficult and error-prone. Formal methods have shown their usefulness ...
Mathilde Arnaud, Véronique Cortier, St&eacu...
ESAS
2004
Springer
14 years 3 days ago
Public Key Cryptography in Sensor Networks - Revisited
The common perception of public key cryptography is that it is complex, slow and power hungry, and as such not at all suitable for use in ultra-low power environments like wireless...
Gunnar Gaubatz, Jens-Peter Kaps, Berk Sunar
ISQED
2007
IEEE
104views Hardware» more  ISQED 2007»
14 years 1 months ago
System Level Estimation of Interconnect Length in the Presence of IP Blocks
With the increasing size and sophistication of circuits and specifically in the presence of IP blocks, new wirelength estimation methods are needed in the design flow of large-sca...
Taraneh Taghavi, Ani Nahapetian, Majid Sarrafzadeh
IROS
2007
IEEE
116views Robotics» more  IROS 2007»
14 years 1 months ago
A multipurpose robotic wheelchair and rehabilitation device for the home
— This paper describes a novel Home Lift, Position, and Rehabilitation (HLPR) Chair, designed at National Institute of Standards and Technology (NIST), to provide independent pat...
Roger Bostelman, James S. Albus
ICCAD
2005
IEEE
113views Hardware» more  ICCAD 2005»
14 years 3 months ago
Synthesis methodology for built-in at-speed testing
We discuss a new synthesis flow, which offers the ability to do easy delay testing almost free in terms of its impact on speed and area as compared to corresponding implementation...
Yinghua Li, Alex Kondratyev, Robert K. Brayton