A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2011; you can also visit the original URL.
The file type is application/pdf
.
Filters
Power conscious CAD tools and methodologies: a perspective
1995
Proceedings of the IEEE
Technology independent gains for power come from the area of design for low power which has a much higher return on investment (ROI). ...
Power consumption is rapidly becoming an area of growing concern in IC and system design houses. ...
ACKNOWLEDGMENT The authors gratefully acknowledge the participation of C. Deng of EPIC Design Technology Inc. for his contribution on PowerMill and circuit level power analysis. ...
doi:10.1109/5.371967
fatcat:63qvma2bbfcabkyvmbr4opbute
Future trends in microelectronics - reflections on the road to nanotechnology
1997
Precision engineering
the data needed, and completing and reviewing the collection of information. ...
Send comment regarding this burden estimates or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington Headquarters Services, Directorate for ...
We consider such grating structures particularly promising for future applications, and extensive studies of such structures are currently underway, to be reported in due course. ...
doi:10.1016/0141-6359(97)90048-9
fatcat:j7blw4wn6zbitmoqqffj46g54e
Ping-pong beam training for reciprocal channels with delay spread
2015
2015 49th Asilomar Conference on Signals, Systems and Computers
In addition, we will improve on the performance of such Coded ALOHA protocols in terms of the resource efficiency. ...
In this work we explore some of the potential fiber-optic data transmission applications of the nonlinear Fourier transform (NFT), a signal analysis technique introduced by mathematicians and physicists ...
and power leakage. ...
doi:10.1109/acssc.2015.7421451
dblp:conf/acssc/CarvalhoA15
fatcat:mqokuvnh3zg45licnfbgxyvxfu
Ultra-Low Power Sub-Threshold Nanoscale CMOS Path Planning Cores
[article]
2013
This processor would provide a computation platform that is smaller, lighter and more power efficient than conventional general-purpose processors to allow these micro-bots to reach a high level of intelligence ...
This project aims to develop a specialized processor that is optimized for power and algorithm efficiency. ...
When the gate voltage of M7 is low the transistor charges up the source of M10, reducing its leakage current and hence load on rBL. ...
doi:10.11575/prism/28545
fatcat:zvynr2koyjal3bikt3o3toqbaa
SRAM Reliability Improvement Using ECC and Circuit Techniques
2018
In these systems, the embedded memory is especially sensitive due to the large number of minimum-sized devices in the cell arrays. ...
We have designed a wordline assertion comparator (WLAC) which has lower area overhead in large cache designs than competing techniques in the literature to detect [...] ...
The cache hierarchy is divided between on-chip (embedded) and off-chip memory. ...
doi:10.1184/r1/6723140.v1
fatcat:gdfwa553yfdjhgnt7pbfk5yew4
Infrastructure-based Anonymous Communication Protocols in Future Internet Architectures
2018
In TARANET's setup phase,traffic analysis is thwarted by mixing. In the da [...] ...
Ourexperiments demonstrate that PHI expands anonymity sets of LAP and Dovetail by over 30x andreaches 120 Gb/s forwarding speed on a commodity software router.3. ...
We will mathematically model the path information leakage of VSS in Section 4.5. ...
doi:10.1184/r1/7212494
fatcat:gmeythrhr5acxjl2i4nh2kyice
System Support for Intermittent Computing
2018
Smart things, spaces, and structures are created by embedding computation into them. ...
Embedded computers sense, compute, and communicate at the edge, closer to the physical rather than the cyber world. ...
In contrast, a dedicated switch can gate power to the entire circuit connected to the capacitor, limiting the overhead current to the reverse leakage current through the switch (e.g. under 1 µA for SIP32431 ...
doi:10.1184/r1/6723470.v1
fatcat:37ex37wod5cbficjeyzlxpnh2e
) 1. Secure Chaotic Maps-based Group Key Agreement Scheme with Privacy Preserving Hongfeng Zhu 1001-1009 A Publicly Verifiable Secret Sharing Scheme Based on Multilinear Diffie-Hellman Assumption Qiao Peng
2016
International Journal of Network Security
unpublished
The proposed protocol is based on chaotic maps to create a kind of signcryption method to transmit authenticated information and make the calculated consumption and communicating round restrict to an acceptable ...
In this paper, we propose the first chaotic maps-based group authentication key agreement protocol. ...
Acknowledgments This work is supported by the Project of The Research of License Plate Recognition System (No.2014j4100201). ...
fatcat:nivpmyymvvecpft6npkuhw7smi
Online) International Journal of Network Security is published both in traditional paper form (ISSN 1816-353X) and in Internet
2017
An Investigation on Biometric Internet Security International Journal of Network Security
unpublished
Due to the Internet revolution in the last decade, each and every work area of society are directly or indirectly depending on computers, highly integrated computer networks and communication systems, ...
This investigation helps in clear understating of e-security challenges and possible implementation of the identified measurements for the challenges in wide area of network communications. ...
Acknowledgments The research is supported by Ministry of Education Malaysia (MOE) and conducted in collaboration with Research Management Center (RMC) at University Teknologi Malaysia (UTM) under VOT NUMBER ...
fatcat:c2q6cwnb6vapbixa3b4ublzf3a
LIPIcs, Volume 230, ITC 2022, Complete Volume
[article]
2022
We hope that providing an alternative definition in the standalone setting would simplify proofs of efficient adaptive security in the future, as the designer of the protocol can focus on the standalone ...
Acknowledgements We are thankful to Siyao Guo for clarifications regarding the known techniques for establishing lower bounds for problems in the generic group model with preprocessing. ...
There are quite a few examples for the surprising power of non-black-box techniques, both in cryptography and in complexity theory. Another partial explanation was offered by Dodis et al. ...
doi:10.4230/lipics.itc.2022
fatcat:essd7vkxajblve2oviyqqe2o3e
Circuit Design Automation for High Speed Interconnects in Advanced Nodes
2021
This thesis would not have been possible without the feedback and support of many people. I would first like to thank Prof. ...
Design complexity has become is a rising issue in modern Mixed-Signal SOC designs. Especially today's Full-Custom flow lags automation. ...
For this, the power grid generator reads out the connectivity of the existing shapes and connects to the highest VDD, VSS shapes of the in the cellview existing instances. ...
doi:10.11588/heidok.00030613
fatcat:aiemwriozraepkma357ettefqi
The Proceedings of 15th Australian Information Security Management Conference, 5-6 December, 2017, Edith Cowan University, Perth, Australia
2017
The papers cover topics from vulnerabilities in "Internet of Things" protocols through to improvements in biometric identification algorithms and surveillance camera weaknesses. ...
We wish to thank the reviewers for kindly volunteering their time and expertise in support of this event. ...
BACKGROUND Past research on cloud computing accountability has produced various definitions, embodying different spheres of accountability research. ...
doi:10.4225/75/5a84fe5695b55
fatcat:numxbkqdfjaklnyvihnznp7iz4
Stinging the Predators: A collection of papers that should never have been published
2017
Figshare
This ebook collects academic papers and conference abstracts that were meant to be so terrible that nobody in their right mind would publishable them. ...
Acknowledgements We thank the following people for their incisive and helpful comments and suggestions on the initial drafts of this case report: Joseph Mayo, MD; Lloyd Braun, MD, PhD; Michael Moffitt, ...
The authors of this study believe that high cocoa content chocolate is therefore an ideal "weight-loss turbo" if used in combination with a low-carb intervention for weight loss. ...
doi:10.6084/m9.figshare.5248264.v4
fatcat:l36rnudrznbhheyghtjojfapei
Protocols for Connecting Blockchains with Off-chain Systems
2020
little of smart contracts' potential power. ...
Smart contracts are programs that execute on blockchains. ...
The Client Interface caches att upon initialization of prog encl . ...
doi:10.7298/jw55-g827
fatcat:2f6qobvuvzenllmhxgoubz7woe