BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Used together with:
memori (6)
use (5)
low (3)
detect (3)
cost (3)

Stem ecc$ (all stems)

16 papers:

SACSAC-2015-GouthamLY #authentication #protocol #smarttech #using
An anonymous ID-based remote mutual authentication with key agreement protocol on ECC using smart cards (RAG, GJL, KYY), pp. 169–174.
HPCAHPCA-2015-KimSE #flexibility #memory management #reliability
Bamboo ECC: Strong, safe, and flexible codes for reliable computer memory (JK, MS, ME), pp. 101–112.
DACDAC-2014-ClercqUHV #implementation #power management
Ultra Low-Power implementation of ECC on the ARM Cortex-M0+ (RdC, LU, AVH, IV), p. 6.
DACDAC-2014-RoyMIT #multi #performance
Tile Before Multiplication: An Efficient Strategy to Optimize DSP Multiplier for Accelerating Prime Field ECC for NIST Curves (DBR, DM, MI, JT), p. 6.
SACSAC-2014-YoonY #authentication #network #using
A biometric-based authenticated key agreement scheme using ECC for wireless sensor networks (EJY, KYY), pp. 699–705.
DATEDATE-2011-KaraklajicFSV #detection #fault #low cost #using
Low-cost fault detection method for ECC using Montgomery powering ladder (DK, JF, JMS, IV), pp. 1016–1021.
DATEDATE-2011-MaW #detection #fault #low cost #named
LOEDAR: A low cost error detection and recovery scheme for ECC (KM, KW), pp. 1010–1015.
DATEDATE-2011-NicolaidisBZ
Eliminating speed penalty in ECC protected memories (MN, TB, NEZ), pp. 1614–1619.
DATEDATE-2010-IzumiISO #multi
Improved countermeasure against Address-bit DPA for ECC scalar multiplication (MI, JI, KS, KO), pp. 981–984.
ASPLOSASPLOS-2010-YoonE #flexibility #in memory #memory management
Virtualized and flexible ECC for main memory (DHY, ME), pp. 397–408.
DATEDATE-2009-GuoS #bound #design #distributed #optimisation #using
Optimizing the HW/SW boundary of an ECC SoC design using control hierarchy and distributed storage (XG, PS), pp. 454–459.
DACDAC-2006-StojanovicBDW #effectiveness #implementation #queue
A cost-effective implementation of an ECC-protected instruction queue for out-of-order microprocessors (VS, RIB, JD, RW), pp. 705–708.
PEPMPEPM-2006-LeuschelEVCF #interface #web
The Ecce and Logen partial evaluators and their web interfaces (ML, DE, MV, SJC, MF), pp. 88–94.
HPCAHPCA-2005-QinLZ #detection #memory management #named
SafeMem: Exploiting ECC-Memory for Detecting Memory Leaks and Memory Corruption During Production Runs (FQ, SL, YZ), pp. 291–302.
LOPSTRLOPSTR-2003-LehmannL #generative #induction #proving #theorem proving #using
Inductive Theorem Proving by Program Specialisation: Generating Proofs for Isabelle Using Ecce (HL, ML), pp. 1–19.
LICSLICS-1989-Luo #calculus
ECC, an Extended Calculus of Constructions (ZL), pp. 386–395.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.