14 Hits in 8.8 sec

Power conscious CAD tools and methodologies: a perspective

D. Singh, J.M. Rabaey, M. Pedram, F. Catthoor, S. Rajgopal, N. Sehgal, T.J. Mozdzen
1995 Proceedings of the IEEE  
Technology independent gains for power come from the area of design for low power which has a much higher return on investment (ROI).  ...  Power consumption is rapidly becoming an area of growing concern in IC and system design houses.  ...  ACKNOWLEDGMENT The authors gratefully acknowledge the participation of C. Deng of EPIC Design Technology Inc. for his contribution on PowerMill and circuit level power analysis.  ... 
doi:10.1109/5.371967 fatcat:63qvma2bbfcabkyvmbr4opbute

Future trends in microelectronics - reflections on the road to nanotechnology

1997 Precision engineering  
the data needed, and completing and reviewing the collection of information.  ...  Send comment regarding this burden estimates or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington Headquarters Services, Directorate for  ...  We consider such grating structures particularly promising for future applications, and extensive studies of such structures are currently underway, to be reported in due course.  ... 
doi:10.1016/0141-6359(97)90048-9 fatcat:j7blw4wn6zbitmoqqffj46g54e

Ping-pong beam training for reciprocal channels with delay spread

Elisabeth de Carvalho, Jorgen Bach Andersen
2015 2015 49th Asilomar Conference on Signals, Systems and Computers  
In addition, we will improve on the performance of such Coded ALOHA protocols in terms of the resource efficiency.  ...  In this work we explore some of the potential fiber-optic data transmission applications of the nonlinear Fourier transform (NFT), a signal analysis technique introduced by mathematicians and physicists  ...  and power leakage.  ... 
doi:10.1109/acssc.2015.7421451 dblp:conf/acssc/CarvalhoA15 fatcat:mqokuvnh3zg45licnfbgxyvxfu

Ultra-Low Power Sub-Threshold Nanoscale CMOS Path Planning Cores [article]

Ryan Wu, University Of Calgary, University Of Calgary, Sebastian Magierowski, Jim Haslett
This processor would provide a computation platform that is smaller, lighter and more power efficient than conventional general-purpose processors to allow these micro-bots to reach a high level of intelligence  ...  This project aims to develop a specialized processor that is optimized for power and algorithm efficiency.  ...  When the gate voltage of M7 is low the transistor charges up the source of M10, reducing its leakage current and hence load on rBL.  ... 
doi:10.11575/prism/28545 fatcat:zvynr2koyjal3bikt3o3toqbaa

SRAM Reliability Improvement Using ECC and Circuit Techniques

Mark McCartney
In these systems, the embedded memory is especially sensitive due to the large number of minimum-sized devices in the cell arrays.  ...  We have designed a wordline assertion comparator (WLAC) which has lower area overhead in large cache designs than competing techniques in the literature to detect [...]  ...  The cache hierarchy is divided between on-chip (embedded) and off-chip memory.  ... 
doi:10.1184/r1/6723140.v1 fatcat:gdfwa553yfdjhgnt7pbfk5yew4

Infrastructure-based Anonymous Communication Protocols in Future Internet Architectures

Chen Chen
In TARANET's setup phase,traffic analysis is thwarted by mixing. In the da [...]  ...  Ourexperiments demonstrate that PHI expands anonymity sets of LAP and Dovetail by over 30x andreaches 120 Gb/s forwarding speed on a commodity software router.3.  ...  We will mathematically model the path information leakage of VSS in Section 4.5.  ... 
doi:10.1184/r1/7212494 fatcat:gmeythrhr5acxjl2i4nh2kyice

System Support for Intermittent Computing

Alexei Colin
Smart things, spaces, and structures are created by embedding computation into them.  ...  Embedded computers sense, compute, and communicate at the edge, closer to the physical rather than the cyber world.  ...  In contrast, a dedicated switch can gate power to the entire circuit connected to the capacitor, limiting the overhead current to the reverse leakage current through the switch (e.g. under 1 µA for SIP32431  ... 
doi:10.1184/r1/6723470.v1 fatcat:37ex37wod5cbficjeyzlxpnh2e

) 1. Secure Chaotic Maps-based Group Key Agreement Scheme with Privacy Preserving Hongfeng Zhu 1001-1009 A Publicly Verifiable Secret Sharing Scheme Based on Multilinear Diffie-Hellman Assumption Qiao Peng

Min-Shiang Hwang, Shu-Fen Chiou, Chia-Chun Wu, Cheng-Yi Yang, Ajith Abraham, Korea, Wael Adi, Iqbal Sheikh, Ahamed, Vijay Atluri, Mauro Barni, Andrew Blyth (+91 others)
2016 International Journal of Network Security   unpublished
The proposed protocol is based on chaotic maps to create a kind of signcryption method to transmit authenticated information and make the calculated consumption and communicating round restrict to an acceptable  ...  In this paper, we propose the first chaotic maps-based group authentication key agreement protocol.  ...  Acknowledgments This work is supported by the Project of The Research of License Plate Recognition System (No.2014j4100201).  ... 

Online) International Journal of Network Security is published both in traditional paper form (ISSN 1816-353X) and in Internet

Min-Shiang Hwang, Shu-Fen Chiou, Chia-Chun Wu, Cheng-Yi Yang, Ajith Abraham, Korea, Wael Adi, Iqbal Sheikh, Ahamed, Vijay Atluri, Mauro Barni, Andrew Blyth (+93 others)
2017 An Investigation on Biometric Internet Security International Journal of Network Security   unpublished
Due to the Internet revolution in the last decade, each and every work area of society are directly or indirectly depending on computers, highly integrated computer networks and communication systems,  ...  This investigation helps in clear understating of e-security challenges and possible implementation of the identified measurements for the challenges in wide area of network communications.  ...  Acknowledgments The research is supported by Ministry of Education Malaysia (MOE) and conducted in collaboration with Research Management Center (RMC) at University Teknologi Malaysia (UTM) under VOT NUMBER  ... 

LIPIcs, Volume 230, ITC 2022, Complete Volume [article]

Dana Dachman-Soled
We hope that providing an alternative definition in the standalone setting would simplify proofs of efficient adaptive security in the future, as the designer of the protocol can focus on the standalone  ...  Acknowledgements We are thankful to Siyao Guo for clarifications regarding the known techniques for establishing lower bounds for problems in the generic group model with preprocessing.  ...  There are quite a few examples for the surprising power of non-black-box techniques, both in cryptography and in complexity theory. Another partial explanation was offered by Dodis et al.  ... 
doi:10.4230/lipics.itc.2022 fatcat:essd7vkxajblve2oviyqqe2o3e

Circuit Design Automation for High Speed Interconnects in Advanced Nodes

Tobias Markus
This thesis would not have been possible without the feedback and support of many people. I would first like to thank Prof.  ...  Design complexity has become is a rising issue in modern Mixed-Signal SOC designs. Especially today's Full-Custom flow lags automation.  ...  For this, the power grid generator reads out the connectivity of the existing shapes and connects to the highest VDD, VSS shapes of the in the cellview existing instances.  ... 
doi:10.11588/heidok.00030613 fatcat:aiemwriozraepkma357ettefqi

The Proceedings of 15th Australian Information Security Management Conference, 5-6 December, 2017, Edith Cowan University, Perth, Australia

Craig Valli
The papers cover topics from vulnerabilities in "Internet of Things" protocols through to improvements in biometric identification algorithms and surveillance camera weaknesses.  ...  We wish to thank the reviewers for kindly volunteering their time and expertise in support of this event.  ...  BACKGROUND Past research on cloud computing accountability has produced various definitions, embodying different spheres of accountability research.  ... 
doi:10.4225/75/5a84fe5695b55 fatcat:numxbkqdfjaklnyvihnznp7iz4

Stinging the Predators: A collection of papers that should never have been published

Zen Faulkes
2017 Figshare  
This ebook collects academic papers and conference abstracts that were meant to be so terrible that nobody in their right mind would publishable them.  ...  Acknowledgements We thank the following people for their incisive and helpful comments and suggestions on the initial drafts of this case report: Joseph Mayo, MD; Lloyd Braun, MD, PhD; Michael Moffitt,  ...  The authors of this study believe that high cocoa content chocolate is therefore an ideal "weight-loss turbo" if used in combination with a low-carb intervention for weight loss.  ... 
doi:10.6084/m9.figshare.5248264.v4 fatcat:l36rnudrznbhheyghtjojfapei

Protocols for Connecting Blockchains with Off-chain Systems

Fan Zhang
little of smart contracts' potential power.  ...  Smart contracts are programs that execute on blockchains.  ...  The Client Interface caches att upon initialization of prog encl .  ... 
doi:10.7298/jw55-g827 fatcat:2f6qobvuvzenllmhxgoubz7woe