Sciweavers

464 search results - page 72 / 93
» hybrid 2009
Sort
View
CHES
2009
Springer
150views Cryptology» more  CHES 2009»
14 years 4 months ago
A Design Flow and Evaluation Framework for DPA-Resistant Instruction Set Extensions
Power-based side channel attacks are a significant security risk, especially for embedded applications. To improve the security of such devices, protected logic styles have been p...
Francesco Regazzoni, Alessandro Cevrero, Fran&cced...
CP
2009
Springer
14 years 4 months ago
Why Cumulative Decomposition Is Not as Bad as It Sounds
Abstract. The global cumulative constraint was proposed for modelling cumulative resources in scheduling problems for finite domain (FD) propagation. Since that time a great deal ...
Andreas Schutt, Thibaut Feydy, Peter J. Stuckey, M...
ESORICS
2009
Springer
14 years 4 months ago
Privacy Preservation over Untrusted Mobile Networks
The proliferation of mobile devices has given rise to novel user-centric applications and services. In current mobile systems, users gain access to remote servers over mobile netwo...
Claudio Agostino Ardagna, Sushil Jajodia, Pierange...
FPGA
2009
ACM
154views FPGA» more  FPGA 2009»
14 years 4 months ago
Synthesis of reconfigurable high-performance multicore systems
Reconfigurable high-performance computing systems (RHPC) have been attracting more and more attention over the past few years. RHPC systems are a promising solution for accelerati...
Jason Cong, Karthik Gururaj, Guoling Han
ISBRA
2009
Springer
14 years 4 months ago
A Linear-Time Algorithm for Analyzing Array CGH Data Using Log Ratio Triangulation
Abstract. DNA copy number is the number of replicates of a contiguous segment of DNA on the genome. Copy number alteration (CNA) is a genetic abnormality in which the number of the...
Matthew Hayes, Jing Li