-
3
-
-
0003793410
-
-
Kluwer Academic, Boston, MA
-
V. Betz, J. S. Rose, and A. Marqardt. Architecture and CAD for deep-submicron FPGAs. Kluwer Academic, Boston, MA, 1999.
-
(1999)
Architecture and CAD for deep-submicron FPGAs
-
-
Betz, V.1
Rose, J.S.2
Marqardt, A.3
-
4
-
-
0141942838
-
Reconfigurable computing systems
-
K. Bondalapati and V. Prasanna. Reconfigurable computing systems. In Proceedings of the IEEE, volume 90(7), pages 1201-17, 2002.
-
(2002)
Proceedings of the IEEE
, vol.90
, Issue.7
, pp. 1201-1217
-
-
Bondalapati, K.1
Prasanna, V.2
-
5
-
-
33847127493
-
Parallel fpga-based all-pairs shortest-paths in a directed graph
-
April
-
U. Bondhugula, A. Devulapalli, J. Fernando, P. Wyckoff, and P. Sadayappan. Parallel fpga-based all-pairs shortest-paths in a directed graph. In Proceedings of the 20th IEEE International Parallel and Distributed Processing Symposium (IPDPS'06), April 2006.
-
(2006)
Proceedings of the 20th IEEE International Parallel and Distributed Processing Symposium (IPDPS'06)
-
-
Bondhugula, U.1
Devulapalli, A.2
Fernando, J.3
Wyckoff, P.4
Sadayappan, P.5
-
6
-
-
12444296471
-
Dynamically configurable security for SRAM FPGA bitstreams
-
Santa Fe, NM, April
-
L. Bossuet, G. Gogniat, and W. Burleson. Dynamically configurable security for SRAM FPGA bitstreams. In Proceedings of the 18th International Parallel and Distributed Processing Symposium (IPDPS '04), Santa Fe, NM, April 2004.
-
(2004)
Proceedings of the 18th International Parallel and Distributed Processing Symposium (IPDPS '04)
-
-
Bossuet, L.1
Gogniat, G.2
Burleson, W.3
-
7
-
-
33750238097
-
Custom computing machines: An introduction
-
D. Buell and K. Pocek. Custom computing machines: an introduction. In Journal of Supercomputing, volume 9(3), pages 219-29, 1995.
-
(1995)
Journal of Supercomputing
, vol.9
, Issue.3
, pp. 219-229
-
-
Buell, D.1
Pocek, K.2
-
9
-
-
0000227930
-
Reconfigurable computing: A survey of systems and software
-
USA, ACM
-
K. Compton and S. Hauck. Reconfigurable computing: a survey of systems and software. In ACM Computing Surveys, volume 34(2), pages 171-210, USA, 2002. ACM.
-
(2002)
ACM Computing Surveys
, vol.34
, Issue.2
, pp. 171-210
-
-
Compton, K.1
Hauck, S.2
-
11
-
-
0032668914
-
Reconfigurable computing: What, why, and implications for design automation
-
West Point, NY
-
A. DeHon and J. Wawrzynek. Reconfigurable computing: what, why, and implications for design automation. In Proceedings of the Design Automation Conference, pages 610-15, West Point, NY, 1999.
-
(1999)
Proceedings of the Design Automation Conference
, pp. 610-615
-
-
DeHon, A.1
Wawrzynek, J.2
-
13
-
-
34547879755
-
Jbits: Java-based interface for reconfigurable computing
-
Laurel, MD, USA, September
-
S. Guccione, D. Levi, and P. Sundararajan. Jbits: Java-based interface for reconfigurable computing. In Proceedings of the Second Annual Conference on Military and Aerospace Applications of Programmable Logic Devices and Technologies (MAPLD), Laurel, MD, USA, September 1999.
-
(1999)
Proceedings of the Second Annual Conference on Military and Aerospace Applications of Programmable Logic Devices and Technologies (MAPLD)
-
-
Guccione, S.1
Levi, D.2
Sundararajan, P.3
-
14
-
-
34548728354
-
FPGA viruses
-
Glasgow, UK, August
-
I. Hadzic, S. Udani, and J. Smith. FPGA viruses. In Proceedings of the Ninth International Workshop on Field-Programmable Logic and Applications (FPL '99), Glasgow, UK, August 1999.
-
(1999)
Proceedings of the Ninth International Workshop on Field-Programmable Logic and Applications (FPL '99)
-
-
Hadzic, I.1
Udani, S.2
Smith, J.3
-
19
-
-
34548811745
-
Policy-driven memory protection for reconfigurable systems
-
Hamburg, Germany, September
-
T. Huffmire, S. Prasad, T. Sherwood, and R. Kastner. Policy-driven memory protection for reconfigurable systems. In Proceedings of the European Symposium on Research in Computer Security (ES-ORICS), Hamburg, Germany, September 2006.
-
(2006)
Proceedings of the European Symposium on Research in Computer Security (ES-ORICS)
-
-
Huffmire, T.1
Prasad, S.2
Sherwood, T.3
Kastner, R.4
-
22
-
-
13644268811
-
-
Kluwer Academic, Boston, MA
-
R. Kastner, A. Kaplan, and M. Sarrafzadeh. Synthesis Techniques and Optimizations for Reconfigurable Systems. Kluwer Academic, Boston, MA, 2004.
-
(2004)
Synthesis Techniques and Optimizations for Reconfigurable Systems
-
-
Kastner, R.1
Kaplan, A.2
Sarrafzadeh, M.3
-
25
-
-
84976667065
-
Shared resource matrix methodology: An approach to identifying storage and timing channels
-
R. Kemmerer. Shared resource matrix methodology: An approach to identifying storage and timing channels. In ACM Transactions on Computer Systems, 1983.
-
(1983)
ACM Transactions on Computer Systems
-
-
Kemmerer, R.1
-
26
-
-
4444331720
-
Security as a new dimension in embedded system design
-
San Diego, CA, June
-
P. Kocher, R. Lee, G. McGraw, A. Raghunathan, and S. Ravi. Security as a new dimension in embedded system design. In Proceedings of the 41st Design Automation Conference (DAC '04), San Diego, CA, June 2004.
-
(2004)
Proceedings of the 41st Design Automation Conference (DAC '04)
-
-
Kocher, P.1
Lee, R.2
McGraw, G.3
Raghunathan, A.4
Ravi, S.5
-
27
-
-
0031633026
-
FPGA fingerprinting techniques for protecting intellectual property
-
San Diego, CA, May
-
J. Lach, W. Mangione-Smith, and M. Potkonjak. FPGA fingerprinting techniques for protecting intellectual property. In Proceedings of the 1999 IEEE Custom Integrated Circuits Conference, San Diego, CA, May 1999.
-
(1999)
Proceedings of the 1999 IEEE Custom Integrated Circuits Conference
-
-
Lach, J.1
Mangione-Smith, W.2
Potkonjak, M.3
-
28
-
-
0032660404
-
Robust FPGA intellectual property protection through multiple small watermarks
-
New Orleans, LA, June
-
J. Lach, W. Mangione-Smith, and M. Potkonjak. Robust FPGA intellectual property protection through multiple small watermarks. In Proceedings of the 36th ACM/IEEE Conference on Design Automation (DAC '99), New Orleans, LA, June 1999.
-
(1999)
Proceedings of the 36th ACM/IEEE Conference on Design Automation (DAC '99)
-
-
Lach, J.1
Mangione-Smith, W.2
Potkonjak, M.3
-
29
-
-
27544511310
-
Architecture for protecting critical secrets in microprocessors
-
June
-
R. Lee, P. Kwan, J. McGregor, J. Dwoskin, and Z. Wang. Architecture for protecting critical secrets in microprocessors. In Proceedings of the 32nd International Symposium on Computer Architecture (ISCA), June 2005.
-
(2005)
Proceedings of the 32nd International Symposium on Computer Architecture (ISCA)
-
-
Lee, R.1
Kwan, P.2
McGregor, J.3
Dwoskin, J.4
Wang, Z.5
-
30
-
-
3142691374
-
Cryptol: High assurance, retargetable crypto development and validation
-
October
-
J. Lewis and B. Martin. Cryptol: High assurance, retargetable crypto development and validation. In Military Communications Conference (MILCOM), October 2003.
-
(2003)
Military Communications Conference (MILCOM)
-
-
Lewis, J.1
Martin, B.2
-
31
-
-
0034445599
-
Architectural support for copy and tamper resistant software
-
Cambridge, MA, November
-
D. Lie, C. Thekkath, M. Mitchell, P. Lincoln, D. Boneh, J. Mitchell, and M. Horowitz. Architectural support for copy and tamper resistant software. In Proceedings of the Ninth International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS-IX), Cambridge, MA, November 2000.
-
(2000)
Proceedings of the Ninth International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS-IX)
-
-
Lie, D.1
Thekkath, C.2
Mitchell, M.3
Lincoln, P.4
Boneh, D.5
Mitchell, J.6
Horowitz, M.7
-
32
-
-
0006480652
-
Logic synthesis and optimization benchmarks
-
Technical report, Microelectronics Center of North Carolina, Research Triangle Park, NC, USA, January
-
B. Lisanke. Logic synthesis and optimization benchmarks. Technical report, Microelectronics Center of North Carolina, Research Triangle Park, NC, USA, January 1991.
-
(1991)
-
-
Lisanke, B.1
-
33
-
-
12444269010
-
-
P. Lysaght and D. Levi. Of gates and wires. In Proceedings of the 18th International Parallel and Distributed Processing Symposium, 2004.
-
P. Lysaght and D. Levi. Of gates and wires. In Proceedings of the 18th International Parallel and Distributed Processing Symposium, 2004.
-
-
-
-
35
-
-
0031343311
-
Seeking solutions in configurable computing
-
W Mangione-Smith, B. Hutchings, D. Andrews, A. DeHon, C. Ebeling, R. Hartenstein, O. Mencer, J. Morris, K. Palem, V. Prasanna, and H. Spaanenburg. Seeking solutions in configurable computing. In Computer, volume 30(12), pages 38-43, 1997.
-
(1997)
Computer
, vol.30
, Issue.12
, pp. 38-43
-
-
Mangione-Smith, W.1
Hutchings, B.2
Andrews, D.3
DeHon, A.4
Ebeling, C.5
Hartenstein, R.6
Mencer, O.7
Morris, J.8
Palem, K.9
Prasanna, V.10
Spaanenburg, H.11
-
36
-
-
34548773745
-
Gartner dataquest analyst gives asic, fpga markets clean bill of health
-
June 13
-
D. McGrath. Gartner dataquest analyst gives asic, fpga markets clean bill of health. EE Times, June 13 2005.
-
(2005)
EE Times
-
-
McGrath, D.1
-
38
-
-
34548734522
-
Used cellphones hold trove of secrets that can be hard to erase
-
October 21
-
E. Nakashima. Used cellphones hold trove of secrets that can be hard to erase. Washington Post, October 21 2006.
-
(2006)
Washington Post
-
-
Nakashima, E.1
-
40
-
-
11244261215
-
Human activity detection and recognition for video surveillance
-
Taipei, Taiwan
-
W. Niu, J. Long, D. Han, and Y.-F. Wang. Human activity detection and recognition for video surveillance. In Proceedings of the IEEE Multimedia and Expo Conference, Taipei, Taiwan, 2004.
-
(2004)
Proceedings of the IEEE Multimedia and Expo Conference
-
-
Niu, W.1
Long, J.2
Han, D.3
Wang, Y.-F.4
-
41
-
-
33646805500
-
Cache missing for fun and profit
-
Ottowa, Ontario, Canada
-
C. Percival. Cache missing for fun and profit. In BSDCan 2005, Ottowa, Ontario, Canada, 2005.
-
(2005)
BSDCan 2005
-
-
Percival, C.1
-
43
-
-
19944423977
-
The protection on information in computer systems
-
July
-
J. Saltzer and M. Schroeder. The protection on information in computer systems. Communications of the ACM, 17(7), July 1974.
-
(1974)
Communications of the ACM
, vol.17
, Issue.7
-
-
Saltzer, J.1
Schroeder, M.2
-
44
-
-
84893793732
-
Masking the energy behavior of des encryption
-
H. Saputra, N. Vijaykrishnan, M. Kandemir, M. Irwin, R. Brooks, S. Kim, and W. Zhang. Masking the energy behavior of des encryption. In IEEE DEsign Automation and Test in Europe (DATE '03), 2003.
-
(2003)
IEEE DEsign Automation and Test in Europe (DATE '03)
-
-
Saputra, H.1
Vijaykrishnan, N.2
Kandemir, M.3
Irwin, M.4
Brooks, R.5
Kim, S.6
Zhang, W.7
-
45
-
-
0034846231
-
A quick safari through the reconfiguration jungle
-
P. Schaumont, I. Verbauwhede, K. Keutzer, and M. Sarrafzadeh. A quick safari through the reconfiguration jungle. In Proceedings of the Design Automation Conference, pages 172-7, 2001.
-
(2001)
Proceedings of the Design Automation Conference
, pp. 172-177
-
-
Schaumont, P.1
Verbauwhede, I.2
Keutzer, K.3
Sarrafzadeh, M.4
-
46
-
-
21844455241
-
Blinkering surveillance: Enabling video privacy through computer vision
-
Technical Report RC22886, IBM, 2003
-
A. Senior, S. Pankanti, A. Hampapur, L. Brown, Y.-L. Tian, and A. Ekin. Blinkering surveillance: Enabling video privacy through computer vision. Technical Report RC22886, IBM, 2003.
-
-
-
Senior, A.1
Pankanti, S.2
Hampapur, A.3
Brown, L.4
Tian, Y.-L.5
Ekin, A.6
-
47
-
-
35248827733
-
Power analysis of FPGAs: How practical is the attack? Field-Programmable Logic and Applications
-
2778, Sept
-
F. Standaert, L. Oldenzeel, D. Samyde, and J. Quisquater. Power analysis of FPGAs: How practical is the attack? Field-Programmable Logic and Applications, 2778(2003):701-711, Sept. 2003.
-
(2003)
, vol.2778
, pp. 701-711
-
-
Standaert, F.1
Oldenzeel, L.2
Samyde, D.3
Quisquater, J.4
-
48
-
-
34547514330
-
-
The Math Works Inc, Guide
-
The Math Works Inc. MATLAB User's Guide, 2006.
-
(2006)
MATLAB User's
-
-
-
49
-
-
84976781807
-
Reflections on trusting trust
-
K. Thompson. Reflections on trusting trust. Communications of the ACM, 27(8), 1984.
-
(1984)
Communications of the ACM
, vol.27
, Issue.8
-
-
Thompson, K.1
-
50
-
-
0030104367
-
Programmable active memories: Reconfigurable systems come of age
-
J. Vuillemin, P. Bertin, D. Roncin, M. Shand, H. Touati, and P. Boucard. Programmable active memories: Reconfigurable systems come of age. In IEEE Transactions on Very Large Scale Integration (VLSI) Systems, volume 4(1), pages 56-69, 1996.
-
(1996)
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
, vol.4
, Issue.1
, pp. 56-69
-
-
Vuillemin, J.1
Bertin, P.2
Roncin, D.3
Shand, M.4
Touati, H.5
Boucard, P.6
-
52
-
-
34548708869
-
-
Architectures and Algorithms for Field-Programmable Gate Arrays with Embedded Memory. PhD thesis, University of Toronto
-
S. Wilton. Architectures and Algorithms for Field-Programmable Gate Arrays with Embedded Memory. PhD thesis, University of Toronto, 1997.
-
(1997)
-
-
Wilton, S.1
-
53
-
-
34548745549
-
-
Xilinx Inc. Getting Started with the Embedded Development Kit EDK
-
Xilinx Inc. Getting Started with the Embedded Development Kit (EDK), 2006.
-
(2006)
-
-
|