Sciweavers

5675 search results - page 8 / 1135
» Exploiting Chaos for Computation
Sort
View
ISCAS
2008
IEEE
85views Hardware» more  ISCAS 2008»
14 years 4 months ago
Investigation of state transition phenomena in cross-coupled chaotic circuits
— Studies on chaos synchronization in coupled chaotic circuits are extensively carried out in various fields. In this study, two simple chaotic circuits cross-coupled by inducto...
Yumiko Uchitani, Yoshifumi Nishio
CORR
2011
Springer
167views Education» more  CORR 2011»
13 years 1 months ago
The weak password problem: chaos, criticality, and encrypted p-CAPTCHAs
- Vulnerabilities related to weak passwords are a pressing global economic and security issue. We report a novel, simple, and effective approach to address the weak password probl...
T. V. Laptyeva, S. Flach, K. Kladko
TIM
2010
144views Education» more  TIM 2010»
13 years 4 months ago
Extending Polynomial Chaos to Include Interval Analysis
Polynomial chaos theory (PCT) has been proven to be an efficient and effective way to represent and propagate uncertainty through system models and algorithms in general. In partic...
Antonello Monti, Ferdinanda Ponci, Marco Valtorta
DAC
2005
ACM
14 years 10 months ago
A non-parametric approach for dynamic range estimation of nonlinear systems
It has been widely recognized that the dynamic range information of an application can be exploited to reduce the datapath bitwidth of either processors or ASICs, and therefore th...
Bin Wu, Jianwen Zhu, Farid N. Najm