Sciweavers

1916 search results - page 326 / 384
» Reconfiguring a state machine
Sort
View
ATAL
2008
Springer
13 years 11 months ago
Methods for complex single-mind architecture designs
The implementation of software systems with large numbers of heterogeneous components calls for a powerful design methodology. Although several such methodologies have been propos...
Kristinn R. Thórisson, Gudny Ragna Jonsdott...
CASES
2008
ACM
13 years 11 months ago
Multiple sleep mode leakage control for cache peripheral circuits in embedded processors
This paper proposes a combination of circuit and architectural techniques to maximize leakage power reduction in embedded processor on-chip caches. It targets cache peripheral cir...
Houman Homayoun, Mohammad A. Makhzan, Alexander V....
CHES
2008
Springer
84views Cryptology» more  CHES 2008»
13 years 11 months ago
A Real-World Attack Breaking A5/1 within Hours
Abstract. In this paper we present a real-world hardware-assisted attack on the wellknown A5/1 stream cipher which is (still) used to secure GSM communication in most countries all...
Timo Gendrullis, Martin Novotný, Andy Rupp
CIKM
2008
Springer
13 years 11 months ago
The role of syntactic features in protein interaction extraction
Most approaches for protein interaction mining from biomedical texts use both lexical and syntactic features. However, the individual impact of these two kinds of features on the ...
Timur Fayruzov, Martine De Cock, Chris Cornelis, V...
PODC
2010
ACM
13 years 11 months ago
Distributed data classification in sensor networks
Low overhead analysis of large distributed data sets is necessary for current data centers and for future sensor networks. In such systems, each node holds some data value, e.g., ...
Ittay Eyal, Idit Keidar, Raphael Rom