Results 41 to 50 of about 1,173,380 (328)
Broadband current-mode logic static divide-by-2 and divide-by-4 circuits fabricated in 65-nm CMOS are presented. The low-power frequency dividers are analyzed in a geometric way.
Mingyu Zhu, Dixian Zhao
doaj +1 more source
High-bandwidth transfer of phase stability through a fiber frequency comb
We demonstrate phase locking of a 729 nm diode laser to a 1542 nm master laser via an erbium-doped-fiber frequency comb, using a transfer-oscillator feedforward scheme which suppresses the effect of comb noise in an unprecedented 1.8 MHz bandwidth.
Hannig, Stephan +6 more
core +1 more source
Testing of mixed-signal systems using dynamic stimuli [PDF]
The impulse response of a linear circuit element contains enough information to functionally characterise that element. A technique for comparison of observed and expected (reference) transient responses, which results in an absolute measure of device ...
Evans, PSA, Pritchard, TI, Taylor, D
core +1 more source
Design Principles for Scaling Multi-core OLTP Under High Contention
Although significant recent progress has been made in improving the multi-core scalability of high throughput transactional database systems, modern systems still fail to achieve scalable throughput for workloads involving frequent access to highly ...
Abadi, Daniel J. +2 more
core +1 more source
Digital signal processing (DSP) kernel-based intellectual property (IP) core forms an integral ingredient of consumer electronics devices. Thus, protection of these IP cores against reverse engineering attack is crucial.
Anirban Sengupta, Mahendra Rathor
doaj +1 more source
From Cryptography to Logic Locking: A Survey on the Architecture Evolution of Secure Scan Chains
The availability of access to Integrated Circuits’ scan chain is an inevitable requirement of modern ICs for testability/debugging purposes. However, leaving access to the scan chain OPEN resulted in numerous security threats on ICs.
Kimia Zamiri Azar +3 more
doaj +1 more source
A New Paradigm in Split Manufacturing: Lock the FEOL, Unlock at the BEOL
Split manufacturing was introduced as an effective countermeasure against hardware-level threats such as IP piracy, overbuilding, and insertion of hardware Trojans.
Knechtel, Johann +3 more
core +1 more source
A Concurrent Perspective on Smart Contracts [PDF]
In this paper, we explore remarkable similarities between multi-transactional behaviors of smart contracts in cryptocurrencies such as Ethereum and classical problems of shared-memory concurrency.
Hobor, Aquinas, Sergey, Ilya
core +2 more sources
Development of trustworthy and secure hardware for Edge AI devices with increasing Deep Learning applications has gained recent attention. Logic locking has been a proven technology for secure and trustworthy designs for hardware obfuscation and enhanced
Kadiyam Tirumalarao +5 more
doaj +1 more source
The current trend of globalization of the supply chain in the integrated circuit (IC) industry has led to numerous security issues, such as intellectual property (IP) piracy, overbuilding, hardware Trojan (HT), and so on.
Weizheng Wang, Luoyi Zhao, Shuo Cai
doaj +1 more source

