Today's reconfigurable radio systems have several interesting functionalities ranging from traditional reconfigurable systems operating at the physical layer only to fully fl...
Giovanni Bartolomeo, Stefano Salsano, Nicola Blefa...
We present a new technique that enables software recovery in legacy applications by retrofitting exception-handling capabilities, error virtualization using rescue points. We int...
Stelios Sidiroglou, Oren Laadan, Angelos D. Keromy...
In networks-on-chip (NoC) designs, delay variations and crosstalk noise have become a serious issue with the continuously shrinking geometry of semiconductor devices and the incre...
Yaoting Jiao, Yulu Yang, Ming He, Mei Yang, Yingta...
Trust management represents today a promising approach for supporting access control in open environments. While several approaches have been proposed for trust management and sig...
Sabrina De Capitani di Vimercati, Sushil Jajodia, ...
Abstract. This paper presents a design-space exploration of the Galois/Counter Mode (GCM) algorithm with Advanced Encryption Standard (AES) as underlying block cipher for high thro...
Stefan Lemsitzer, Johannes Wolkerstorfer, Norbert ...