Sciweavers

983 search results - page 160 / 197
» Circuit Complexity and Multiplicative Complexity of Boolean ...
Sort
View
CHES
2009
Springer
230views Cryptology» more  CHES 2009»
14 years 9 months ago
Designing an ASIP for Cryptographic Pairings over Barreto-Naehrig Curves
Abstract. This paper presents a design-space exploration of an applicationspecific instruction-set processor (ASIP) for the computation of various cryptographic pairings over Barre...
David Kammler, Diandian Zhang, Dominik Auras, Gerd...
PERCOM
2006
ACM
14 years 8 months ago
A Multi-Commodity Flow Approach for Globally Aware Routing in Multi-Hop Wireless Networks
Routing in multi-hop wireless networks is typically greedy, with every connection attempting to establish a path that minimizes its number of hops. However, interference plays a m...
Vinay Kolar, Nael B. Abu-Ghazaleh
IUI
2009
ACM
14 years 5 months ago
From geek to sleek: integrating task learning tools to support end users in real-world applications
Numerous techniques exist to help users automate repetitive tasks; however, none of these methods fully support enduser creation, use, and modification of the learned tasks. We pr...
Aaron Spaulding, Jim Blythe, Will Haines, Melinda ...
MOMPES
2009
IEEE
14 years 3 months ago
ArcheOpterix: An extendable tool for architecture optimization of AADL models
For embedded systems quality requirements are equally if not even more important than functional requirements. The foundation for the fulfillment of these quality requirements ha...
Aldeida Aleti, Stefan Björnander, Lars Grunsk...
FMCAD
2009
Springer
14 years 3 months ago
Scaling VLSI design debugging with interpolation
—Given an erroneous design, functional verification returns an error trace exhibiting a mismatch between the specification and the implementation of a design. Automated design ...
Brian Keng, Andreas G. Veneris