Sciweavers

2947 search results - page 136 / 590
» Analyzing Program Analyses
Sort
View
CTRSA
2004
Springer
91views Cryptology» more  CTRSA 2004»
15 years 10 months ago
Periodic Properties of Counter Assisted Stream Ciphers
Abstract. This paper analyses periodic properties of counter assisted stream ciphers. In particular, we analyze constructions where the counter system also has the purpose of provi...
Ove Scavenius, Martin Boesgaard, Thomas Pedersen, ...
ISCAS
2002
IEEE
87views Hardware» more  ISCAS 2002»
15 years 9 months ago
Transient bit error rate analysis of data recovery systems using jitter models
This paper presents a method for analyzing the Bit Error Rate of recovered data for PLL-based data recovery systems (DRS) as the PLL comes into lock. This method is based on the a...
Yonghui Tang, Randall L. Geiger
CRIWG
2008
15 years 6 months ago
Risk Assessment in Healthcare Collaborative Settings: A Case Study Using SHELL
This paper describes a case study addressing risk assessment in a hospital unit. The objective was to analyse the impact on collaborative work after the unit changed their installa...
Pedro Antunes, Rogerio Bandeira, Luís Carri...
AAAI
2006
15 years 6 months ago
A New Approach to Estimating the Expected First Hitting Time of Evolutionary Algorithms
The expected first hitting time is an important issue in theoretical analyses of evolutionary algorithms since it implies the average computational time complexity. In this paper,...
Yang Yu, Zhi-Hua Zhou
TSP
2010
14 years 11 months ago
On the distortion exponents of layered broadcast transmission in multi-relay cooperative networks
In this paper, we consider the transmission of a Gaussian source over a cooperative relay network, and analyze its end-to-end distortion at high signal-to-noise ratio, in terms of ...
Jing Wang, Jie Liang, Sami Muhaidat