Search

Showing total 80 results
80 results

Search Results

1. Hybrid Annealing Method Based on subQUBO Model Extraction With Multiple Solution Instances.

2. Magnifying Side-Channel Leakage of Lattice-Based Cryptosystems With Chosen Ciphertexts: The Case Study of Kyber.

3. MGARD+: Optimizing Multilevel Methods for Error-Bounded Scientific Data Reduction.

4. High Performance Parallel Decimal Multipliers Using Hybrid BCD Codes.

5. Segmented Tag Cache: A Novel Cache Organization for Reducing Dynamic Read Energy.

6. Quick-and-Dirty: An Architecture for High-Performance Temporary Short Writes in MLC PCM.

7. An Analytical Model for Performance and Lifetime Estimation of Hybrid DRAM-NVM Main Memories.

8. Optimized Modular Multiplication for Supersingular Isogeny Diffie-Hellman.

9. Content Aware Refresh: Exploiting the Asymmetry of DRAM Retention Errors to Reduce the Refresh Frequency of Less Vulnerable Data.

10. Optimizing Polynomial Convolution for NTRUEncrypt.

11. Design of Hybrid Second-Level Caches.

12. Symmetric Property and Reliability of Balanced Hypercube.

13. Hardware-Based Trusted Computing Architectures for Isolation and Attestation.

14. Exponential Sums and Correctly-Rounded Functions.

15. Dynamic Checkpointing Policy in Heterogeneous Real-Time Standby Systems.

16. HRT-PLRU: A New Paging Schemefor Executing Hard Real-Time Programson NAND Flash Memory.

17. Symbolic Analysis of Higher-Order Side Channel Countermeasures.

18. Adaptive Scheduling of Task Graphs with Dynamic Resilience.

19. DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments.

20. Parallel Decodable Multi-Level Unequal Burst Error Correcting Codes for Memories of Approximate Systems.

21. ELmD: A Pipelineable Authenticated Encryption and Its Hardware Implementation.

22. Statistical Analysis of Second Order Differential Power Analysis.

23. A Provably Secure True Random Number Generator with Built-In Tolerance to Active Attacks.

24. In-Line Interrupt Handling and Lock-Up Free Translation Lookaside Buffers (TLBs).

25. Affinity-Driven System Design Exploration for Heterogeneous Multiprocessor SoC.

26. Security Protection and Checking for Embedded System Integration against Buffer Overflow Attacks via Hardware/Software.

27. Code Size Reduction in Heterogeneous-Connectivity-Based DSPs Using Instruction Set Extensions.

28. Pattern Matching in LZW Compressed Files.

29. Custom Wide Counterflow Pipelines for High-Performance Embedded Applications.

30. A Framework for Truthful Online Auctions in Cloud Computing with Heterogeneous User Demands.

31. A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Computing.

32. Radix-2 Division Algorithms with an Over-Redundant Digit Set.

33. Statistical Performance Comparisons of Computers.

34. L-Networks: A Topological Model for Regular 2D Interconnection Networks.

35. Designing a Physical Locality Aware Coherence Protocol for Chip-Multiprocessors.

36. Compiler-Directed Energy Reduction Using Dynamic Voltage Scaling and Voltage Islands for Embedded Systems.

37. Heuristics for Flexible CMP Synthesis.

38. A General Framework for Parameterized Schedulability Bound Analysis of Real-Time Systems.

39. A Floating-Point Unit for 4D Vector Inner Product with Reduced Latency.

40. An Algebraic Language for Distributed Quantum Computing.

41. Replacing Associative Load Queues: A Timing-Centric Approach.

42. Immunet: Dependable Routing for Interconnection Networks with Arbitrary Topology.

43. The Synonym Lookaside Buffer: A Solution to the Synonym Problem in Virtual Caches.

44. Strongly Diagnosable Product Networks Under the Comparison Diagnosis Model.

45. Elimination of Overhead Operations in Complex Loop Structures for Embedded Microprocessors.

46. Bipartite Modular Multiplication Method.

47. Multicore Curve-Based Cryptoprocessor with Reconfigurable Modular Arithmetic Logic Units over GF(2n).

48. Optimal Selective Huffman Coding for Test-Data Compression.

49. Testability Analysis and Scalable Test Generation for High-Speed Floating-Point Units.

50. Multilevel Design Validation in a Secure Embedded System.