Sciweavers

1219 search results - page 212 / 244
» Verification of Equivalent-Results Methods
Sort
View
ASPDAC
2005
ACM
81views Hardware» more  ASPDAC 2005»
15 years 5 months ago
Power estimation starategies for a low-power security processor
In this paper, we present the power estimation methodologies for the development of a low-power security processor that contains significant amount of logic and memory. For the lo...
Yen-Fong Lee, Shi-Yu Huang, Sheng-Yu Hsu, I-Ling C...
ASSETS
2005
ACM
15 years 5 months ago
Research-derived web design guidelines for older people
This paper presents the development of a set of researchderived ageing-centred Web design guidelines. An initial set of guidelines was first developed through an extensive review ...
Sri Hastuti Kurniawan, Panayiotis Zaphiris
AUSAI
2006
Springer
15 years 5 months ago
An Efficient Alternative to SVM Based Recursive Feature Elimination with Applications in Natural Language Processing and Bioinfo
The SVM based Recursive Feature Elimination (RFE-SVM) algorithm is a popular technique for feature selection, used in natural language processing and bioinformatics. Recently it wa...
Justin Bedo, Conrad Sanderson, Adam Kowalczyk
ECSA
2008
Springer
15 years 5 months ago
Non-synchronous Communications in Process Algebraic Architectural Description Languages
Abstract. Architectural description languages are a useful tool for modmplex software systems at a high level of abstraction and, if based on formal methods, for enabling the early...
Marco Bernardo, Edoardo Bontà
FPL
2008
Springer
157views Hardware» more  FPL 2008»
15 years 4 months ago
Chosen-message SPA attacks against FPGA-based RSA hardware implementations
This paper presents SPA (Simple Power Analysis) attacks against public-key cryptosystems implemented on an FPGA platform. The SPA attack investigates a power waveform generated by...
Atsushi Miyamoto, Naofumi Homma, Takafumi Aoki, Ak...