Learn More
The reverse engineering (RE) of electronic chips and systems can be used with honest and dishonest intentions. To inhibit RE for those with dishonest intentions (e.g., piracy and counterfeiting), it is important that the community is aware of the state-of-the-art capabilities available to attackers today. In this article, we will be presenting a survey of(More)
This paper presents a new power management technique for RF circuits powered by renewable energy sources. Different from conventional systems, the performance of self-powered RF circuits is largely constrained by two factors: time-varying fading channel conditions and non-deterministic renewable energy levels. The proposed technique dynamically adjusts the(More)
—There are many evidences that people tend to overweight low-probability events and underweight high-probability events. This risk attitude is generally expressed as an inverseS shaped weighting function. This paper considers a risk-averse inventory manager who operates a continuous-review inventory system subject to supply disruption risk. Both(More)