Sciweavers

2778 search results - page 511 / 556
» Reuse Technique in Hardware Design
Sort
View
WS
2006
ACM
14 years 2 months ago
Location privacy in wireless personal area networks
Location privacy is one of the major security problems in a Wireless Personal Area Network (WPAN). By eavesdropping on the transmitted packets, an attacker can keep track of the p...
Dave Singelée, Bart Preneel
AUTOID
2005
IEEE
14 years 2 months ago
An Ultra-Low Power, Optically-Interrogated Smart Tagging and Identification System
We present a wireless identification system that employs an optical communications link between an array of uniquely identifiable smart tags and an interrogator flashlight. As the...
Gerardo Barroeta Perez, Mateusz Malinowski, Joseph...
CODES
2005
IEEE
14 years 2 months ago
Rappit: framework for synthesis of host-assisted scripting engines for adaptive embedded systems
Scripting is a powerful, high-level, cross-platform, dynamic, easy way of composing software modules as black boxes. Unfortunately, the high runtime overhead has prevented scripti...
Jiwon Hahn, Qiang Xie, Pai H. Chou
CODES
2005
IEEE
14 years 2 months ago
Satisfying real-time constraints with custom instructions
Instruction-set extensible processors allow an existing processor core to be extended with application-specific custom instructions. In this paper, we explore a novel application...
Pan Yu, Tulika Mitra
ISCAS
2005
IEEE
95views Hardware» more  ISCAS 2005»
14 years 2 months ago
Area, power, and pin efficient bus transceiver using multi-bit-differential signaling
—This paper describes a new low-power, area and pin efficient alternative to differential encoding for high performance chip-to-chip and backplane signaling. The technique, calle...
Donald M. Chiarulli, Jason D. Bakos, Joel R. Marti...