نتایج جستجو برای: leakage

تعداد نتایج: 30774  

2003
Cassondra Neau Kaushik Roy

As we enter the nanoscale regime, power reduction is of increasing importance, but the established leakage reduction techniques will become less effective. Subthreshold leakage is being joined by band-to-band tunneling and gate leakage as the primary leakage mechanisms. The increased significance of these leakage components threatens the usefulness of some traditional leakage reduction techniqu...

2006
Dusung Kim Jiseok Kim Wayne P. Burleson Basab Datta Jinwook Jang

The DRAM cells consist of one or several MOSFET devices and the subthreshold leakage current through the MOSFET strongly depends on the temperature variation. Therefore, it is obvious that the leakage of a memory cell is highly related to temperature variation. The temperature of the circuit can be measured indirectly by using leakage sensors which can be applied to various VLSI circuits becaus...

Journal: :iranian endodontic journal 0
yazdan shantiaee 1. assistant professor of endodontics, dental research center, dental school, shahid beheshti university of medical sciences, tehran, iran. farzin maziar assistant professor of endodontics, iranian center for endodontic research, dental school, shahid beheshti university of medical sciences, tehran, iran omid dianat general dentist faranak mahjour general dentist

introduction: favorable apical seal of root filling materials is a crucial factor for a successful root canal treatment. the aim of this in vitro study was to compare bacterial and dye microleakage of two root canal filling materials including standard gutta-percha and nanosilver coated gutta-percha, and to evaluate the agreement between results of these two methods . materials & methods: fifty...

Journal: :dental research journal 0
saeed moradi mahdi lomee maryam gharechahi

background: apical leakage assessment is a way to compare the effi ciency of a fi lling material to seal the apical region of the tooth. many microleakage testing techniques have been introduced through the years, but there has been no agreement as to which technique gives the most accurate results. the aim of this study was to compare the accuracy of fl uid fi ltration and bacterial leakage te...

Journal: :IACR Cryptology ePrint Archive 2010
Allison Bishop Yannis Rouselakis Brent Waters

In this work, we show that strong leakage resilience for cryptosystems with advanced functionalitiescan be obtained quite naturally within the methodology of dual system encryption, recently introducedby Waters. We demonstrate this concretely by providing fully secure IBE, HIBE, and ABE systems whichare resilient to bounded leakage from each of many secret keys per user, as well as ...

2014
Reevana Balmahoon Ling Cheng

A new generalised approach for multiple correlated sources over a wiretap network is investigated. A basic model consisting of two correlated sources where each produce a component of the common information is initially investigated. There are several cases that consider wiretapped syndromes on the transmission links and based on these cases a new quantity, the information leakage at the source...

2013
Andreea Maier Diana Nicoară

Innovation is becoming more and more important in modern society. There are a lot of researches on different kinds of innovation but marketing innovation is one kind of innovation that has not been studied frequently before. Marketing innovation is defined as a new way in which companies can market themselves to potential or existing customers. The study shows some key elements for marketing in...

Journal: :Int. J. Game Theory 2014
Kfir Eliaz Roberto Serrano

Consider the problem of information disclosure for a planner who faces two agents interacting in a state-dependent multi-action prisoners’dilemma. We …nd conditions under which the planner can make use of his superior information by disclosing some of it to the agents, and conditions under which such information leakage is not possible. Although the problem is entirely symmetric, the planner’s ...

2017
Suvradip Chakraborty Goutam Paul C. Pandu Rangan

The goal of leakage-resilient cryptography is to construct cryptographic algorithms that are secure even if the adversary obtains side-channel information from the real world implementation of these algorithms. Most of the prior works on leakage-resilient cryptography consider leakage models where the adversary has access to the leakage oracle before the challenge-ciphertext is generated (befor...

2007
Ashesh Rastogi Kunal Ganeshpure Alodeep Sanyal Sandip Kundu

There are three major sources of leakage current today, namely the sub-threshold leakage, gate leakage and the reverse biased junction band-to-band-tunneling leakage. These currents depend on the logic state of a CMOS circuit as determined by input pattern. Consequently, there exists a pattern that will produce the highest leakage current. Previously, researchers have investigated the problem o...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید