Sciweavers

96 search results - page 9 / 20
» A Survey of Symbolic Methods in Computational Analysis of Cr...
Sort
View
ITC
1998
IEEE
94views Hardware» more  ITC 1998»
13 years 11 months ago
A method of serial data jitter analysis using one-shot time interval measurements
A method for measuring inter-symbol interference, duty cycle distortion, random jitter and periodic jitter is described. The Blackman-Tukey method of signal analysis is used. This...
Jan B. Wilstrup
STACS
1997
Springer
13 years 11 months ago
Methods and Applications of (MAX, +) Linear Algebra
Exotic semirings such as the “(max, +) semiring” (R ∪ {−∞}, max, +), or the “tropical semiring” (N ∪ {+∞}, min, +), have been invented and reinvented many times s...
Stephane Gaubert, Max Plus
MYCRYPT
2005
Springer
189views Cryptology» more  MYCRYPT 2005»
14 years 25 days ago
An Analysis of Double Base Number Systems and a Sublinear Scalar Multiplication Algorithm
In this paper we produce a practical and efficient algorithm to find a decomposition of type n = kˆ i=1 2si 3ti , si, ti ∈ N ∪ {0} with k ≤   c + o(1) ¡ log n log log n ....
Mathieu Ciet, Francesco Sica
WSNA
2003
ACM
14 years 18 days ago
Analyzing and modeling encryption overhead for sensor network nodes
Recent research in sensor networks has raised security issues for small embedded devices. Security concerns are motivated by the deployment of a large number of sensory devices in...
Prasanth Ganesan, Ramnath Venugopalan, Pushkin Ped...
SAS
2001
Springer
149views Formal Methods» more  SAS 2001»
13 years 11 months ago
Analysis of Multithreaded Programs
Abstract. The field of program analysis has focused primarily on sequential programming languages. But multithreading is becoming increasingly important, both as a program structu...
Martin C. Rinard