Sciweavers

DATE
2007
IEEE
114views Hardware» more  DATE 2007»
14 years 3 months ago
Performance aware secure code partitioning
Many embedded applications exist where decisions are made using sensitive information. A critical issue in such applications is to ensure that data is accessed only by authorized ...
Sri Hari Krishna Narayanan, Mahmut T. Kandemir, Ri...
DATE
2007
IEEE
146views Hardware» more  DATE 2007»
14 years 3 months ago
DFM/DFY: should you trust the surgeon or the family doctor?
Everybody agrees that curing DFM/DFY issues is of paramount importance at 65 nanometers and beyond. Unfortunately, there is disagreement about how and when to cure them. “Surgeo...
Marco Casale-Rossi, Andrzej J. Strojwas, Robert C....
DATE
2007
IEEE
143views Hardware» more  DATE 2007»
14 years 3 months ago
Portable multimedia SoC design: a global challenge
- The intrinsic capability brought by each new technology node opens the way to a broad range of system integration options and continuously enables new applications to be integrat...
Maurizio Paganini, Georg Kimmich, Stephane Ducrey,...
DATE
2007
IEEE
69views Hardware» more  DATE 2007»
14 years 3 months ago
Verification-guided soft error resilience
Sanjit A. Seshia, Wenchao Li, Subhasish Mitra
DATE
2007
IEEE
79views Hardware» more  DATE 2007»
14 years 3 months ago
Utilization of SECDED for soft error and variation-induced defect tolerance in caches
Combination of SECDED with a redundancy technique can effectively tolerate a high variation-induced defect rate in future processes. However, while a defective cell in a block can...
Luong Dinh Hung, Hidetsugu Irie, Masahiro Goshima,...
DATE
2007
IEEE
134views Hardware» more  DATE 2007»
14 years 3 months ago
Non-fractional parallelism in LDPC decoder implementations
Because of its excellent bit-error-rate performance, the Low-Density Parity-Check (LDPC) decoding algorithm is gaining increased attention in communication standards and literatur...
John Dielissen, Andries Hekstra
DATE
2007
IEEE
73views Hardware» more  DATE 2007»
14 years 3 months ago
Design methods for security and trust
The design of ubiquitous and embedded computers focuses on cost factors such as area, power-consumption, and performance. Security and trust properties, on the other hand, are oft...
Ingrid Verbauwhede, Patrick Schaumont
DATE
2007
IEEE
79views Hardware» more  DATE 2007»
14 years 3 months ago
HW/SW implementation from abstract architecture models
plementation from Abstract Architecture Models Ahmed Amine Jerraya TIMA Laboratory - 46, av. Félix Viallet - 38031 Grenoble – France
Ahmed Amine Jerraya