Sciweavers

139 search results - page 20 / 28
» ics 2009
Sort
View
ICASSP
2009
IEEE
14 years 2 months ago
What happens when cognitive terminals compete for a relaying node?
We introduce a new channel, which consists of an interference channel (IC) in parallel with an interference relay channel (IRC), to analyze the interaction between two selfish and...
Elena Veronica Belmega, Brice Djeumou, Samson Lasa...
GLOBECOM
2009
IEEE
13 years 8 months ago
SC-FDMA Versus OFDMA: Sensitivity to Large Carrier Frequency and Timing Offsets on the Uplink
In this paper, we present a comparison between the sensitivity of SC-FDMA and OFDMA schemes to large carrier frequency offsets (CFO) and timing offsets (TO) of different users on t...
K. Raghunath, Ananthanarayanan Chockalingam
HOST
2009
IEEE
13 years 8 months ago
Experiences in Hardware Trojan Design and Implementation
Abstract-- We report our experiences in designing and implementing several hardware Trojans within the framework of the Embedded System Challenge competition that was held as part ...
Yier Jin, Nathan Kupp, Yiorgos Makris
ICCAD
2009
IEEE
121views Hardware» more  ICCAD 2009»
13 years 8 months ago
MOLES: Malicious off-chip leakage enabled by side-channels
Economic incentives have driven the semiconductor industry to separate design from fabrication in recent years. This trend leads to potential vulnerabilities from untrusted circui...
Lang Lin, Wayne Burleson, Christof Paar
NANONET
2009
Springer
200views Chemistry» more  NANONET 2009»
14 years 5 months ago
Repeater Insertion for Two-Terminal Nets in Three-Dimensional Integrated Circuits
A new approach for inserting repeaters in 3-D interconnects is proposed. The allocation of repeaters along an interplane interconnect is iteratively determined. The proposed approa...
Hu Xu, Vasilis F. Pavlidis, Giovanni De Micheli