Sciweavers

2663 search results - page 39 / 533
» The Design, Implementation, and Evaluation of Jade
Sort
View
CHES
2009
Springer
150views Cryptology» more  CHES 2009»
14 years 3 months ago
A Design Flow and Evaluation Framework for DPA-Resistant Instruction Set Extensions
Power-based side channel attacks are a significant security risk, especially for embedded applications. To improve the security of such devices, protected logic styles have been p...
Francesco Regazzoni, Alessandro Cevrero, Fran&cced...
ADHOC
2008
135views more  ADHOC 2008»
13 years 8 months ago
Rapid design and evaluation framework for wireless sensor networks
The diversity of applications and typically scarce node resources set very tight constraints to Wireless Sensor Networks (WSN). It is not possible to fulfill all requirements with...
Mauri Kuorilehto, Marko Hännikäinen, Tim...
DAC
2009
ACM
14 years 9 months ago
Evaluating design trade-offs in customizable processors
The short time-to-market window for embedded systems demands automation of design methodologies for customizable processors. Recent research advances in this direction have mostly...
Unmesh D. Bordoloi, Huynh Phung Huynh, Samarjit Ch...
MOBISYS
2009
ACM
14 years 9 months ago
mFerio: the design and evaluation of a peer-to-peer mobile payment system
In this paper, we present the design and evaluation of a nearfield communication-based mobile p2p payment application called mFerio which is designed to replace cash-based transac...
Rajesh Krishna Balan, Narayan Ramasubbu, Komsit Pr...
GROUP
2007
ACM
14 years 12 days ago
Evaluating tagging behavior in social bookmarking systems: metrics and design heuristics
To improve existing social bookmarking systems and to design new ones, researchers and practitioners need to understand how to evaluate tagging behavior. In this paper, we analyze...
Umer Farooq, Thomas George Kannampallil, Yang Song...