Akademska digitalna zbirka SLovenije - logo

Rezultati iskanja

Osnovno iskanje    Ukazno iskanje   

Trenutno NISTE avtorizirani za dostop do e-virov konzorcija SI. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 97
1.
  • Energy-Efficient Hybrid Ana... Energy-Efficient Hybrid Analog/Digital Approximate Computation in Continuous Time
    Ning Guo; Yipeng Huang; Tao Mai ... IEEE journal of solid-state circuits, 2016-July, 2016-7-00, 20160701, Letnik: 51, Številka: 7
    Journal Article
    Recenzirano

    We present a unit that performs continuous-time hybrid approximate computation, in which both analog and digital signals are functions of continuous time. Our 65 nm CMOS prototype system is capable ...
Celotno besedilo
Dostopno za: IJS, NUK, UL
2.
  • Analog Computing in a Moder... Analog Computing in a Modern Context: A Linear Algebra Accelerator Case Study
    Yipeng Huang; Ning Guo; Mingoo Seok ... IEEE MICRO, 2017, Letnik: 37, Številka: 3
    Journal Article
    Recenzirano

    Approaching the post-Moore's law era, researchers are looking for scalable ways to get useful computation from existing silicon technology. This article presents a programmable analog accelerator for ...
Celotno besedilo
Dostopno za: IJS, NUK, UL
3.
Celotno besedilo
Dostopno za: IJS, NUK, UL
4.
  • Hardware-Enforced Privacy Hardware-Enforced Privacy
    Sethumadhavan, Simha Computer (Long Beach, Calif.), 10/2016, Letnik: 49, Številka: 10
    Journal Article
    Recenzirano

      This installment of Computer's series highlighting the work published in IEEE Computer Society journals comes from IEEE Computer Architecture Letters.
Celotno besedilo
Dostopno za: IJS, NUK, UL
5.
  • FANCI FANCI
    Waksman, Adam; Suozzo, Matthew; Sethumadhavan, Simha Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, 11/2013
    Conference Proceeding

    Hardware design today bears similarities to software design. Often vendors buy and integrate code acquired from third-party organizations into their designs, especially in embedded/system-on-chip ...
Celotno besedilo
Dostopno za: NUK, UL
6.
  • Secure Architectures Secure Architectures
    Sethumadhavan, Simha; Tiwari, Mohit IEEE MICRO, 2019-July-Aug.-1, 2019-7-1, Letnik: 39, Številka: 4
    Journal Article
    Recenzirano
    Odprti dostop

    The articles in this special section focus on secure computer architectures. Hardware is the bedrock on which all computing systems are built. Recently developed hardware ideas for enhancing the ...
Celotno besedilo
Dostopno za: IJS, NUK, UL

PDF
7.
  • Practical memory safety wit... Practical memory safety with REST
    Sinha, Kanad; Sethumadhavan, Simha 2018 ACM/IEEE 45th Annual International Symposium on Computer Architecture (ISCA), 06/2018
    Conference Proceeding

    In this paper, we propose Random Embedded Secret Tokens (REST), a simple hardware primitive to provide content-based checks, and show how it can be used to mitigate common types of spatial and ...
Celotno besedilo
Dostopno za: IJS, NUK, UL, UM
8.
  • The Spy in the Sandbox The Spy in the Sandbox
    Oren, Yossef; Kemerlis, Vasileios P.; Sethumadhavan, Simha ... Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 10/2015
    Conference Proceeding

    We present a micro-architectural side-channel attack that runs entirely in the browser. In contrast to previous work in this genre, our attack does not require the attacker to install software on the ...
Celotno besedilo
Dostopno za: NUK, UL
9.
  • Silencing Hardware Backdoors Silencing Hardware Backdoors
    Waksman, Adam; Sethumadhavan, Simha 2011 IEEE Symposium on Security and Privacy
    Conference Proceeding
    Odprti dostop

    Hardware components can contain hidden backdoors, which can be enabled with catastrophic effects or for ill-gotten profit. These backdoors can be inserted by a malicious insider on the design team or ...
Celotno besedilo
Dostopno za: IJS, NUK, UL, UM

PDF
10.
  • Architectural Security Regu... Architectural Security Regulation
    Hastings, Adam; Piersma, Ryan; Sethumadhavan, Simha IEEE computer architecture letters, 2023-July-Dec., 2023-7-00, Letnik: 22, Številka: 2
    Journal Article
    Recenzirano

    Across the world, governments are instituting regulations with the goal of improving the state of computer security. In this paper, we propose how security regulation can be formulated and ...
Celotno besedilo
Dostopno za: IJS, NUK, UL
1 2 3 4 5
zadetkov: 97

Nalaganje filtrov