Sciweavers

901 search results - page 26 / 181
» Analyzing linear mergers
Sort
View
CTRSA
2010
Springer
189views Cryptology» more  CTRSA 2010»
14 years 3 months ago
Linear Cryptanalysis of Reduced-Round PRESENT
Abstract. PRESENT is a hardware-oriented block cipher suitable for resource constrained environment. In this paper we analyze PRESENT by the multidimensional linear cryptanalysis m...
Joo Yeon Cho
ICRA
2005
IEEE
112views Robotics» more  ICRA 2005»
14 years 2 months ago
Manipulation Planning for Knotting/Unknotting and Tightly Tying of Deformable Linear Objects
— A planning method for knotting/unknotting and tightening manipulation of deformable linear objects is proposed. It is important for linear object manipulation in industrial/med...
Hidefumi Wakamatsu, Akira Tsumaya, Eiji Arai, Shin...
ICTCS
2003
Springer
14 years 1 months ago
On the Computational Complexity of Cut-Elimination in Linear Logic
Abstract. Given two proofs in a logical system with a confluent cutelimination procedure, the cut-elimination problem (CEP) is to decide whether these proofs reduce to the same no...
Harry G. Mairson, Kazushige Terui
ISCAS
1999
IEEE
121views Hardware» more  ISCAS 1999»
14 years 24 days ago
The linear time-varying approach applied to a first-order dynamic translinear filter
Dynamic translinear (DTL) circuits use the exponential inputoutput relation of the transistor as a primitive for the synthesis of electronic circuits. As a consequence the analysi...
F. C. M. Kuijstermans, F. M. Diepstraten, Wouter A...
JSAC
2008
86views more  JSAC 2008»
13 years 8 months ago
Distributed function calculation and consensus using linear iterative strategies
Given an arbitrary network of interconnected nodes, we develop and analyze a distributed strategy that enables a subset of the nodes to calculate any given function of the node val...
Shreyas Sundaram, Christoforos N. Hadjicostis