97 papers:
- DAC-2015-LiuYYSLLCLWJ #design
- A spiking neuromorphic design with resistive crossbar (CL, BY, CY, LS, ZL, BL, YC, HL, QW, HJ), p. 6.
- DATE-2015-CalayirDWP #multi #programmable
- Analog neuromorphic computing enabled by multi-gate programmable resistive devices (VC, MD, JAW, LP), pp. 928–931.
- DATE-2015-ChenKXMLYVSCY #algorithm #array #learning
- Technology-design co-optimization of resistive cross-point array for accelerating learning algorithms on chip (PYC, DK, ZX, AM, BL, JY, SBKV, JsS, YC, SY), pp. 854–859.
- DATE-2015-Lastras-Montano #configuration management #hybrid #memory management #named
- HReRAM: a hybrid reconfigurable resistive random-access memory (MALM, AG, KTC), pp. 1299–1304.
- DATE-2015-TanLF #memory management #reliability #using
- Soft-error reliability and power co-optimization for GPGPUS register file using resistive memory (JT, ZL, XF), pp. 369–374.
- DATE-2015-VijayakumarK #design #modelling #novel
- A novel modeling attack resistant PUF design based on non-linear voltage transfer characteristics (AV, SK), pp. 653–658.
- ICEIS-v3-2015-Syynimaa #architecture #enterprise #modelling
- Modelling the Resistance of Enterprise Architecture Adoption — Linking Strategic Level of Enterprise Architecture to Organisational Changes and Change Resistance (NS), pp. 143–153.
- HPCA-2015-XuNMBZY0 #architecture #challenge #memory management
- Overcoming the challenges of crossbar resistive memory architectures (CX, DN, NM, RB, TZ, SY, YX), pp. 476–488.
- SOSP-2015-HooffLZZ #analysis #named #scalability
- Vuvuzela: scalable private messaging resistant to traffic analysis (JvdH, DL, MZ, NZ), pp. 137–152.
- DAC-2014-EldibWTS #named #source code
- QMS: Evaluating the Side-Channel Resistance of Masked Software from Source Code (HE, CW, MMIT, PS), p. 6.
- DAC-2014-ShanSFZTXYL #algorithm #analysis #configuration management #encryption #multi
- A Side-channel Analysis Resistant Reconfigurable Cryptographic Coprocessor Supporting Multiple Block Cipher Algorithms (WS, LS, XF, XZ, CT, ZX, JY, JL), p. 6.
- DATE-2014-ClermidyJOOTTVPB #question
- Resistive memories: Which applications? (FC, NJ, SO, HO, OT, OT, EV, JMP, MB), pp. 1–6.
- DATE-2014-RahmanFFT #design #named
- ARO-PUF: An aging-resistant ring oscillator PUF design (MTR, DF, JF, MT), pp. 1–6.
- DATE-2014-YangMPOP #logic #using
- Complementary resistive switch based stateful logic operations using material implication (YY, JM, DKP, MO, SP), pp. 1–4.
- STOC-2014-KhotTW #approximate
- A characterization of strong approximation resistance (SK, MT, PW), pp. 634–643.
- ICALP-v1-2014-KhotTW #approximate #complexity
- The Complexity of Somewhat Approximation Resistant Predicates (SK, MT, PW), pp. 689–700.
- ICALP-v2-2014-DamsHK #learning #network
- Jamming-Resistant Learning in Wireless Networks (JD, MH, TK), pp. 447–458.
- CIKM-2014-ChengKWT #parallel #robust
- Robust and Skew-resistant Parallel Joins in Shared-Nothing Systems (LC, SK, TEW, GT), pp. 1399–1408.
- ICPR-2014-HoschlF #image #retrieval
- Noise-Resistant Image Retrieval (CHI, JF), pp. 2972–2977.
- DAC-2013-SharadFR #memory management #power management
- Ultra low power associative computing with spin neurons and resistive crossbar memory (MS, DF, KR), p. 6.
- STOC-2013-Chan #approximate #independence
- Approximation resistance from pairwise independent subgroups (SOC), pp. 447–456.
- STOC-2013-Huang #approximate #satisfiability
- Approximation resistance on satisfiable instances for predicates with few accepting inputs (SH), pp. 457–466.
- HPCA-2013-GoswamiCL #architecture #memory management #throughput #using
- Power-performance co-optimization of throughput core architecture using resistive memory (NG, BC, TL), pp. 342–353.
- CASE-2012-WuHYC #component #integration
- Pressure-drop studies of resistance components for integration into a SFM-based fluidic circuit (CHW, YFH, ASY, PHC), pp. 896–899.
- DATE-2012-AzevedoVBDGTPAM #architecture #fault
- Impact of resistive-open defects on the heat current of TAS-MRAM architectures (JA, AV, AB, LD, PG, ATS, GP, JAH, KM), pp. 532–537.
- DATE-2012-HaronH #fault
- DfT schemes for resistive open defects in RRAMs (NZH, SH), pp. 799–804.
- FM-2012-HeatherS #framework #modelling
- A Formal Framework for Modelling Coercion Resistance and Receipt Freeness (JH, SS), pp. 217–231.
- AdaEurope-2012-ForlerLW #api #design #encryption #library #programming
- Designing the API for a Cryptographic Library — A Misuse-Resistant Application Programming Interface (CF, SL, JW), pp. 75–88.
- SAC-2012-Kerschbaum #outsourcing #set
- Collusion-resistant outsourcing of private set intersection (FK), pp. 1451–1456.
- DAC-2011-CevreroRSBIL #library #logic #power management #standard
- Power-gated MOS current mode logic (PG-MCML): a power aware DPA-resistant standard cell library (AC, FR, MS, SB, PI, YL), pp. 1014–1019.
- KDD-2011-DubeyCB #graph #ranking
- Diversity in ranking via resistive graph centers (AD, SC, CB), pp. 78–86.
- RecSys-2011-PraweshP #recommendation
- The “top N” news recommender: count distortion and manipulation resistance (SP, BP), pp. 237–244.
- ISSTA-2011-BernatRM #performance
- Efficient, sensitivity resistant binary instrumentation (ARB, KAR, BPM), pp. 89–99.
- CHI-2010-ForgetCB #visual notation
- Shoulder-surfing resistance with eye-gaze entry in cued-recall graphical passwords (AF, SC, RB), pp. 1107–1110.
- ICPR-2010-PalenichkaLZ #difference #image
- Outlier-Resistant Dissimilarity Measure for Feature-based Image Matching (RMP, AL, MBZ), pp. 846–849.
- ICPR-2010-Soheili
- Blind Wavelet Based Logo Watermarking Resisting to Cropping (MRS), pp. 1449–1452.
- KDD-2010-YangNSS #data mining #mining #privacy
- Collusion-resistant privacy-preserving data mining (BY, HN, IS, JS), pp. 483–492.
- SIGIR-2010-WangH #distance #effectiveness #metric #query #similarity
- Effective query expansion with the resistance distance based term similarity metric (SW, MH), pp. 715–716.
- SAC-2010-BlackshearV
- R-LEAP+: randomizing LEAP+ key distribution to resist replay and jamming attacks (SB, RMV), pp. 1985–1992.
- ASPLOS-2010-IpekCNBM #memory management #reliability
- Dynamically replicated memory: building reliable systems from nanoscale resistive memories (EI, JC, EBN, DB, TM), pp. 3–14.
- DAC-2009-El-MoselhyED #algorithm #performance
- An efficient resistance sensitivity extraction algorithm for conductors of arbitrary shapes (TAEM, IME, BD), pp. 770–775.
- DAC-2009-HelinskiAP #physics #using
- A physical unclonable function defined using power distribution system equivalent resistance variations (RH, DA, JP), pp. 676–681.
- ICDAR-2009-ChenLM #pseudo #towards
- Toward Resisting Forgery Attacks via Pseudo-Signatures (JC, DPL, FM), pp. 51–55.
- STOC-2009-AustrinH #independence
- Randomly supported independence and resistance (PA, JH), pp. 483–492.
- KDD-2009-AshrafiN
- Collusion-resistant anonymous data collection method (MZA, SKN), pp. 69–78.
- RecSys-2009-RoyY #collaboration
- Manipulation-resistant collaborative filtering systems (BVR, XY), pp. 165–172.
- DATE-2008-EngelkePSB #fault #industrial #simulation
- Resistive Bridging Fault Simulation of Industrial Circuits (PE, IP, JS, BB), pp. 628–633.
- VLDB-2008-HayMJTW #identification #network #social
- Resisting structural re-identification in anonymized social networks (MH, GM, DJ, DFT, PW), pp. 102–114.
- TACAS-2008-BarnatBSW #ltl #model checking
- Revisiting Resistance Speeds Up I/O-Efficient LTL Model Checking (JB, LB, PS, MW), pp. 48–62.
- STOC-2008-SpielmanS #effectiveness #graph
- Graph sparsification by effective resistances (DAS, NS), pp. 563–568.
- ICALP-C-2008-ShrimptonS
- Building a Collision-Resistant Compression Function from Non-compressing Primitives (TS, MS), pp. 643–654.
- CIKM-2008-AcharyyaG #analysis #product line
- A spam resistant family of concavo-convex ranks for link analysis (SA, JG), pp. 1505–1506.
- RecSys-2008-ResnickS #recommendation
- The information cost of manipulation-resistance in recommender systems (PR, RS), pp. 147–154.
- SIGIR-2008-MehtaN #collaboration
- Attack resistant collaborative filtering (BM, WN), pp. 75–82.
- SAC-2008-AraujoSF #algebra #analysis #process
- HIV drug resistance analysis tool based on process algebra (LVdA, ECS, JEF), pp. 1358–1363.
- SAC-2008-BadishiK #adaptation #using
- Improving denial of service resistance using dynamic local adaptations (GB, IK), pp. 2212–2218.
- DATE-2007-LinFYL #design #encryption #hardware
- Overcoming glitches and dissipation timing skews in design of DPA-resistant cryptographic hardware (KJL, SCF, SHY, CCL), pp. 1265–1270.
- DATE-2007-RosselloBBS #statistics #testing
- Dynamic critical resistance: a timing-based critical resistance model for statistical delay testing of nanometer ICs (JLR, CdB, SAB, JS), pp. 1271–1276.
- ICALP-2007-FurukawaA #black box #encryption
- Fully Collusion Resistant Black-Box Traitor Revocable Broadcast Encryption with Short Private Keys (JF, NA), pp. 496–508.
- RecSys-2007-ResnickS #recommendation
- The influence limiter: provably manipulation-resistant recommender systems (PR, RS), pp. 25–32.
- SAC-2007-NguyenT #detection #kernel #towards
- Towards a tamper-resistant kernel rootkit detector (AQN, YT), pp. 276–283.
- ASE-2006-GrossK #automation #scalability
- Automated Information Aggregation for Scaling Scale-Resistant Services (PG, GEK), pp. 15–24.
- ICALP-v2-2006-LyubashevskyM
- Generalized Compact Knapsacks Are Collision Resistant (VL, DM), pp. 144–155.
- ICPR-v2-2006-ThakoorJWG #classification
- Occlusion Resistant Shape Classifier based onWarped Optimal Path Matching (NT, SJ, QW, JG), pp. 60–63.
- RE-2006-RegevGW #problem
- Creativity and the Age-Old Resistance to Change Problem in RE (GR, DCG, AW), pp. 284–291.
- SAC-2006-SchiavoniQ #architecture #component #programming #tool support
- A posteriori defensive programming: an annotation toolkit for DoS-resistant component-based architectures (VS, VQ), pp. 1734–1738.
- CASE-2005-DaiG #development #metric
- Development of impulse resistance measurement instrument (WD, SG), pp. 244–248.
- DAC-2005-DililloGPVB #analysis #comparison #fault #injection
- Resistive-open defect injection in SRAM core-cell: analysis and comparison between 0.13 µm and 90 nm technologies (LD, PG, SP, AV, MB), pp. 857–862.
- DATE-2005-SoensPWD #analysis #simulation
- Simulation Methodology for Analysis of Substrate Noise Impact on Analog / RF Circuits Including Interconnect Resistance (CS, GVdP, PW, SD), pp. 270–275.
- DATE-2005-TiriV05a #design
- A VLSI Design Flow for Secure Side-Channel Attack Resistant ICs (KT, IV), pp. 58–63.
- DATE-2005-YangWVSX #approach #design
- Power Attack Resistant Cryptosystem Design: A Dynamic Voltage and Frequency Switching Approach (SY, WW, NV, DNS, YX), pp. 64–69.
- DRR-2005-BairdR #named #segmentation
- ScatterType: a reading CAPTCHA resistant to segmentation attack (HSB, TPR), pp. 197–207.
- DATE-v1-2004-TiriV #design #implementation #logic
- A Logic Level Design Methodology for a Secure DPA Resistant ASIC or FPGA Implementation (KT, IV), pp. 246–251.
- MLDM-2003-Boulle #named
- Khiops: A Discretization Method of Continuous Attributes with Guaranteed Resistance to Noise (MB), pp. 50–64.
- LCTES-2003-ZhangPV #clustering
- Tamper-resistant whole program partitioning (TZ, SP, AVG), pp. 209–219.
- DAC-2002-SchrikM #modelling
- Combined BEM/FEM substrate resistance modeling (ES, NPvdM), pp. 771–776.
- OSDI-2002-QiePP #programming #tool support #using
- Defensive Programming: Using an Annotation Toolkit to Build DoS-Resistant Software (XQ, RP, LLP), pp. 45–60.
- ICPR-v2-2000-LohRW #incremental #learning #named #network
- IFOSART: A Noise Resistant Neural Network Capable of Incremental Learning (AWKL, MCR, GAWW), pp. 2985–2988.
- ASPLOS-2000-LieTMLBMH #architecture
- Architectural Support for Copy and Tamper Resistant Software (DL, CAT, MM, PL, DB, JCM, MH), pp. 168–177.
- DAC-1999-LiTRK #modelling #simulation
- Substrate Modeling and Lumped Substrate Resistance Extraction for CMOS ESD/Latchup Circuit Simulation (TL, CHT, ER, SMK), pp. 549–554.
- DAC-1998-KrauterM #analysis #layout
- Layout Based Frequency Dependent Inductance and Resistance Extraction for On-Chip Interconnect Timing Analysis (BK, SM), pp. 303–308.
- DAC-1996-GenderenM #performance #using
- Using Articulation Nodes to Improve the Efficiency of Finite-Element based Resistance Extraction (AJvG, NPvdM), pp. 758–763.
- DAC-1996-GoodbyO #pseudo
- Pseudorandom-Pattern Test Resistance in High-Performance DSP Datapaths (LG, AO), pp. 813–818.
- SIGMOD-1996-GangulyGMS #estimation
- Bifocal Sampling for Skew-Resistant Join Size Estimation (SG, PBG, YM, AS), pp. 271–281.
- DAC-1995-MeijsG
- Delayed Frontal Solution for Finite-Element Based Resistance Extraction (NPvdM, AJvG), pp. 273–278.
- EDAC-1994-IkedaA
- A Reduced-swing Data Transmission Scheme for Resistive Bus Lines in VSLIs (MI, KA), pp. 546–550.
- CHI-1994-BowersP94a #design #prototype #requirements
- Talking through design: requirements and resistance in cooperative prototyping (JB, JP), pp. 299–305.
- DAC-1993-HamadaCC #approach #linear #named #network #using
- Prime: A Timing-Driven Placement Tool using A Piecewise Linear Resistive Network Approach (TH, CKC, PMC), pp. 531–536.
- DAC-1993-LadageL #algorithm #using
- Resistance Extraction using a Routing Algorithm (LL, RL), pp. 38–42.
- CADE-1992-HuaZ #induction #named
- FRI: Failure-Resistant Induction in RRL (XH, HZ), pp. 691–695.
- ML-1991-BelyaevF #classification
- Noise-Resistant Classification (LVB, LPF), pp. 581–585.
- DAC-1989-Chiang #question
- Resistance Extraction and Resistance Calculation in GOALIE? (KWC), pp. 682–685.
- STOC-1989-ChandraRRST #graph
- The Electrical Resistance of a Graph Captures its Commute and Cover Times (Detailed Abstract) (AKC, PR, WLR, RS, PT), pp. 574–586.
- DAC-1987-StarkH #named #simulation
- RED: Resistance Extraction for Digital Simulation (DS, MH), pp. 570–573.
- DAC-1985-Barke #finite
- Resistance calculation from mask artwork data by finite element method (EB), pp. 305–311.
- SIGMOD-1977-Verhofstadt
- Recovery and Carsh Resistance in a Filing System (JV), pp. 158–167.
- ICSE-1976-YauCC #approach #design
- An Approach to Error-Resistant Software Design (SSY, RCC, DCC), pp. 429–436.