Code optimization and high level synthesis can be posed as constraint satisfaction and optimization problems, such as graph coloring used in register allocation. Graph coloring is...
Arathi Ramani, Fadi A. Aloul, Igor L. Markov, Kare...
It is well known that a malicious adversary can try to retrieve secret information by inducing a fault during cryptographic operations. Following the work of Seifert on fault induc...
Music librarians and cataloguers have traditionally created indexes that allow users to access musical works using standard reference information, such as the name of the composer...
Oblivious transfer (OT) is an important primitive in cryptography. In chosen one-out-of-two string OT, a sender offers two strings, one of which the other party, called the receive...
The School of Architecture and Allied Arts at the University of Oregon consists of nine departments and programs with 5000 students, 160 faculty, and a few dozen staff. When I cam...