-
1
-
-
84864137122
-
-
I2c controller core
-
I2c controller core. http://opencores.com/project,i2c.
-
-
-
-
2
-
-
84864150155
-
-
Opencores
-
Opencores. http://opencores.com/.
-
-
-
-
3
-
-
84864150153
-
-
Simple spi core
-
Simple spi core. http://opencores.com/project,simple-spi.
-
-
-
-
4
-
-
84864150158
-
-
Soc interconnection: Wishbone
-
Soc interconnection: Wishbone. http://opencores.org/opencores,wishbone.
-
-
-
-
5
-
-
84864134948
-
-
Spi core
-
Spi core. http://opencores.com/project,spi.
-
-
-
-
6
-
-
0022808049
-
Finding a maximum clique in an arbitrary graph
-
E. Balas and C. S. Yu. Finding a maximum clique in an arbitrary graph. SIAM J. Comput., 15:1054-1068, November 1986. (Pubitemid 17465854)
-
(1986)
SIAM Journal on Computing
, vol.15
, Issue.4
, pp. 1054-1068
-
-
Balas Egon1
Yu Chang Sung2
-
8
-
-
18644376855
-
Design patterns for reconfigurable computing
-
Proceedings - 12th Annual IEEE Symposium on Field-Programmable Custom Computing Machines, FCCM 2004
-
A. DeHon, J. Adams, M. DeLorimier, N. Kapre, Y. Matsuda, H. Naeimi, M. Vanier, and M. Wrighton. Design patterns for reconfigurable computing. In Field-Programmable Custom Computing Machines, 2004. FCCM 2004. 12th Annual IEEE Symposium on, pages 13-23, april 2004. (Pubitemid 40661978)
-
(2004)
Proceedings - 12th Annual IEEE Symposium on Field-Programmable Custom Computing Machines, FCCM 2004
, pp. 13-23
-
-
DeHon, A.1
Adams, J.2
DeLorimier, M.3
Kapre, N.4
Matsuda, Y.5
Naeimi, H.6
Vanier, M.7
Wrighton, M.8
-
11
-
-
0033359923
-
Unveiling the ISCAS-85 benchmarks: A case study in reverse engineering
-
DOI 10.1109/54.785838
-
M. C. Hansen, H. Yalcin, and J. P. Hayes. Unveiling the ISCAS-85 benchmarks: A case study in reverse engineering. IEEE Design & Test of Computers, 16(3):72-80, 1999. (Pubitemid 30497933)
-
(1999)
IEEE Design and Test of Computers
, vol.16
, Issue.3
, pp. 72-80
-
-
Hansen, M.C.1
Yalcin, H.2
Hayes, J.P.3
-
12
-
-
77955218749
-
Overcoming an untrusted computing base: Detecting and removing malicious hardware automatically
-
M. Hicks, M. Finnicum, S. T. King, M. M. K. Martin, and J. M. Smith. Overcoming an untrusted computing base: Detecting and removing malicious hardware automatically. In IEEE Symposium on Security and Privacy, pages 159-172, 2010.
-
(2010)
IEEE Symposium on Security and Privacy
, pp. 159-172
-
-
Hicks, M.1
Finnicum, M.2
King, S.T.3
Martin, M.M.K.4
Smith, J.M.5
-
13
-
-
77956200046
-
Scalable specification mining for verification and diagnosis
-
W. Li, A. Forin, and S. A. Seshia. Scalable specification mining for verification and diagnosis. In Design Automation Conference, pages 755-760, 2010.
-
(2010)
Design Automation Conference
, pp. 755-760
-
-
Li, W.1
Forin, A.2
Seshia, S.A.3
-
16
-
-
0031376592
-
Establishing latch correspondence for sequential circuits using distinguishing signatures
-
J. Mohnke, P. Molitor, and S. Malik. Establishing latch correspondence for sequential circuits using distinguishing signatures. In MidWest Symposium on Circuits and Systems, pages 472-476, 1997.
-
(1997)
MidWest Symposium on Circuits and Systems
, pp. 472-476
-
-
Mohnke, J.1
Molitor, P.2
Malik, S.3
-
19
-
-
49749134668
-
EPIC: Ending piracy of integrated circuits
-
J. A. Roy, F. Koushanfar, and I. L. Markov. EPIC: Ending piracy of integrated circuits. In Proc. Design, Automation and Test in Europe (DATE), pages 1069-1074, 2008.
-
(2008)
Proc. Design, Automation and Test in Europe (DATE)
, pp. 1069-1074
-
-
Roy, J.A.1
Koushanfar, F.2
Markov, I.L.3
-
20
-
-
77955997460
-
A highly efficient method for extracting FSMs from flattened gate-level netlist
-
Y. Shi, C. W. Ting, B.-H. Gwee, and Y. Ren. A highly efficient method for extracting FSMs from flattened gate-level netlist. In IEEE International Symposium on Circuits and Systems (ISCAS 2010), pages 2610-2613, 2010.
-
(2010)
IEEE International Symposium on Circuits and Systems (ISCAS 2010)
, pp. 2610-2613
-
-
Shi, Y.1
Ting, C.W.2
Gwee, B.-H.3
Ren, Y.4
-
21
-
-
80051957441
-
Defeating UCI: Building stealthy and malicious hardware
-
C. Sturton, M. Hicks, D. Wagner, and S. T. King. Defeating UCI: Building stealthy and malicious hardware. In IEEE Symposium on Security and Privacy, pages 64-77, 2011.
-
(2011)
IEEE Symposium on Security and Privacy
, pp. 64-77
-
-
Sturton, C.1
Hicks, M.2
Wagner, D.3
King, S.T.4
|