Sciweavers

13618 search results - page 2605 / 2724
» The Newton Operating System
Sort
View
119
Voted
ICCD
2008
IEEE
142views Hardware» more  ICCD 2008»
16 years 17 days ago
Making register file resistant to power analysis attacks
— Power analysis attacks are a type of side-channel attacks that exploits the power consumption of computing devices to retrieve secret information. They are very effective in br...
Shuo Wang, Fan Zhang, Jianwei Dai, Lei Wang, Zhiji...
116
Voted
ICCD
2006
IEEE
113views Hardware» more  ICCD 2006»
16 years 16 days ago
A theory of Error-Rate Testing
— We have entered an era where chip yields are decreasing with scaling. A new concept called intelligible testing has been previously proposed with the goal of reversing this tre...
Shideh Shahidi, Sandeep Gupta
105
Voted
ICCAD
2004
IEEE
114views Hardware» more  ICCAD 2004»
16 years 16 days ago
High-level synthesis using computation-unit integrated memories
Abstract— High-level synthesis (HLS) of memory-intensive applications has featured several innovations in terms of enhancements made to the basic memory organization and data lay...
Chao Huang, Srivaths Ravi, Anand Raghunathan, Nira...
128
Voted
ICCAD
2004
IEEE
191views Hardware» more  ICCAD 2004»
16 years 16 days ago
Checking consistency of C and Verilog using predicate abstraction and induction
edicate Abstraction and Induction Edmund Clarke Daniel Kroening June 25, 2004 CMU-CS-04-131 School of Computer Science Carnegie Mellon University Pittsburgh, PA 15213 It is common...
Daniel Kroening, Edmund M. Clarke
ICCAD
2003
IEEE
148views Hardware» more  ICCAD 2003»
16 years 16 days ago
The Compositional Far Side of Image Computation
Symbolic image computation is the most fundamental computation in BDD-based sequential system optimization and formal verification. In this paper, we explore the use of over-appr...
Chao Wang, Gary D. Hachtel, Fabio Somenzi
« Prev « First page 2605 / 2724 Last » Next »