Sciweavers

3379 search results - page 87 / 676
» Powers of Two
Sort
View
JDCTA
2010
175views more  JDCTA 2010»
14 years 11 months ago
Evolution Cipher against Differential Power Attack
: Differntial Power Attack (DPA) is one kind of Side Channel Attacks (SCAs). There are two phases in DPA attacks: sample collection and statistical analysis, which can be utilized ...
Shubo Liu, Ming Tang, Si Gao, Huanguo Zhang
ESORICS
1994
Springer
15 years 8 months ago
On the Expressive Power of the Unary Transformation Model
The Transformation Model TRM was recently introduced 10 in the literature by Sandhu and Ganta. TRM is based on the concept of transformation of rights. The propagation of access ri...
Ravi S. Sandhu, Srinivas Ganta
DATE
2007
IEEE
88views Hardware» more  DATE 2007»
15 years 10 months ago
Improve CAM power efficiency using decoupled match line scheme
Content addressable memory (CAM) is widely used in many applications that require fast table lookup. Due to the parallel comparison feature and high frequency of lookup, however, ...
Yen-Jen Chang, Yuan-Hong Liao, Shanq-Jang Ruan
PATMOS
2004
Springer
15 years 9 months ago
A Dual Low Power and Crosstalk Immune Encoding Scheme for System-on-Chip Buses
Abstract. Crosstalk causes logical errors due to data dependent delay degradation as well as energy consumption and is considered the biggest signal integrity challenge for long on...
Zahid Khan, Tughrul Arslan, Ahmet T. Erdogan
CORR
2011
Springer
139views Education» more  CORR 2011»
14 years 7 months ago
Volatility of Power Grids under Real-Time Pricing
—The paper proposes a framework for modeling and analysis of the dynamics of supply, demand, and clearing prices in power system with real-time retail pricing and information asy...
Mardavij Roozbehani, Munther Dahleh, Sanjoy K. Mit...