Sciweavers

1219 search results - page 212 / 244
» Verification of Equivalent-Results Methods
Sort
View
ASPDAC
2005
ACM
81views Hardware» more  ASPDAC 2005»
13 years 12 months ago
Power estimation starategies for a low-power security processor
In this paper, we present the power estimation methodologies for the development of a low-power security processor that contains significant amount of logic and memory. For the lo...
Yen-Fong Lee, Shi-Yu Huang, Sheng-Yu Hsu, I-Ling C...
ASSETS
2005
ACM
13 years 12 months ago
Research-derived web design guidelines for older people
This paper presents the development of a set of researchderived ageing-centred Web design guidelines. An initial set of guidelines was first developed through an extensive review ...
Sri Hastuti Kurniawan, Panayiotis Zaphiris
AUSAI
2006
Springer
13 years 12 months ago
An Efficient Alternative to SVM Based Recursive Feature Elimination with Applications in Natural Language Processing and Bioinfo
The SVM based Recursive Feature Elimination (RFE-SVM) algorithm is a popular technique for feature selection, used in natural language processing and bioinformatics. Recently it wa...
Justin Bedo, Conrad Sanderson, Adam Kowalczyk
ECSA
2008
Springer
13 years 11 months ago
Non-synchronous Communications in Process Algebraic Architectural Description Languages
Abstract. Architectural description languages are a useful tool for modmplex software systems at a high level of abstraction and, if based on formal methods, for enabling the early...
Marco Bernardo, Edoardo Bontà
FPL
2008
Springer
157views Hardware» more  FPL 2008»
13 years 11 months ago
Chosen-message SPA attacks against FPGA-based RSA hardware implementations
This paper presents SPA (Simple Power Analysis) attacks against public-key cryptosystems implemented on an FPGA platform. The SPA attack investigates a power waveform generated by...
Atsushi Miyamoto, Naofumi Homma, Takafumi Aoki, Ak...