Sciweavers

92 search results - page 6 / 19
» ic 2008
Sort
View
CSREAEEE
2008
164views Business» more  CSREAEEE 2008»
13 years 9 months ago
Online Peer-to-Peer Lending: A Lenders' Perspective
ic copy available at: http://ssrn.com/abstract=1352352 Online Peer-to-Peer Lending: A Lenders' Perspective Michael Klafft Fraunhofer ISST, Berlin, Germany
Michael Klafft
CORR
2008
Springer
138views Education» more  CORR 2008»
13 years 7 months ago
Capacity Bounds for the Gaussian Interference Channel
Abstract-- The capacity region of the two-user Gaussian Interference Channel (IC) is studied. Two classes of channels are considered: weak and mixed Gaussian IC. For the weak Gauss...
Abolfazl S. Motahari, Amir K. Khandani
DFT
2008
IEEE
182views VLSI» more  DFT 2008»
13 years 9 months ago
Hardware Trojan Detection and Isolation Using Current Integration and Localized Current Analysis
This paper addresses a new threat to the security of integrated circuits (ICs). The migration of IC fabrication to untrusted foundries has made ICs vulnerable to malicious alterat...
Xiaoxiao Wang, Hassan Salmani, Mohammad Tehranipoo...
TVLSI
2008
116views more  TVLSI 2008»
13 years 7 months ago
Adaptive Cooling of Integrated Circuits Using Digital Microfluidics
Thermal management is critical for integrated circuit (IC) design. With each new IC technology generation, feature sizes decrease, while operating speeds and package densities incr...
Philip Y. Paik, Vamsee K. Pamula, Krishnendu Chakr...
HOST
2008
IEEE
14 years 2 months ago
Detecting Malicious Inclusions in Secure Hardware: Challenges and Solutions
This paper addresses a new threat to the security of integrated circuits (ICs) used in safety critical, security and military systems. The migration of IC fabrication to low-cost ...
Xiaoxiao Wang, Mohammad Tehranipoor, Jim Plusquell...