Learn More
Though skyline queries already have claimed their place in retrieval over central databases, their application in Web information systems up to now was impossible due to the distributed aspect of retrieval over Web sources. But due to the amount, variety and volatile nature of information accessible over the Internet extended query capabilities are crucial.(More)
Cooperative database retrieval is a challenging problem: top k retrieval delivers manageable results only when a suitable compensation function (e.g. a weighted mean) is explicitly given. On the other hand skyline queries offer intuitive querying to users, but result set sizes grow exponentially and hence can easily exceed manageable levels. We show how to(More)
The continuously widening gap between the Non-Recurring Engineering(NRE) and Recurring Engineering (RE) costs of producing Integrated Circuit (IC) products in the past few decades gives high incentives to unauthorized cloning and reverse-engineering of ICs. Existing IC Digital Rights Management (DRM) schemes often demands high overhead in area, power, and(More)
The presence of process variation (PV) in deep submicron technologies has become a major concern for energy optimization attempts on FPGAs. We develop a negative bias temperature instability (NBTI) aging-based post-silicon leakage energy optimization scheme that stresses the components that are not used or are off the critical paths to reduce the total(More)
Yttria (Y 2 O 3) has become a promising gate oxide material to replace silicon dioxide in metal-oxide-semiconductor (MOS) devices. The characterization of native point defect in Y 2 O 3 is essential to understand the behavior of the material. We used the first-principles pseudopotential method to study the electronic structure, defect structure and(More)
The impact of process variation (PV) in deep submicron CMOS technologies has raised major concerns for energy optimization efforts in FPGAs. We have developed a post-silicon leakage energy optimization scheme that raises the threshold voltage (by way of negative bias temperature instability (NBTI) aging) of the components that are either unused or not on(More)
In this paper we present a secure and unclonable embedded system design that can target either an FPGA or an ASIC technology. The premise of the security is that the executed machine code and the executing environment (the embedded processor) will authenticate each other at a per-instruction basis using Physical Unclonable Functions (PUFs) that are built(More)
Serials of Mn doping by substituting Cd sites on Cu2CdSnSe4 are prepared by the melting method and the spark plasma sintering (SPS) technique to form Cu2Cd1-xMnxSnSe4. Our experimental and theoretical studies show that the moderate Mn doping by substituting Cd sites is an effective method to improve the thermoelectric performance of Cu2CdSnSe4. The(More)
In the near future, firmware security will be imperative for the large number of smart embedded devices that are tightly integrated into one's daily lives. In this paper, we present a security scheme for these embedded systems that can provide protection from tempered binaries and the thefts of hardware and software Intellectual Properties (IPs). The key(More)