Sciweavers

877 search results - page 28 / 176
» Full Abstraction for HOPLA
Sort
View
SACRYPT
1998
Springer
257views Cryptology» more  SACRYPT 1998»
13 years 11 months ago
Cryptanalysis of RC4-like Ciphers
Abstract. RC4, a stream cipher designed by Rivest for RSA Data Security Inc., has found several commercial applications, but little public analysis has been done to date. In this p...
Serge Mister, Stafford E. Tavares
ASYNC
2004
IEEE
98views Hardware» more  ASYNC 2004»
13 years 11 months ago
Synthesis of Speed Independent Circuits Based on Decomposition
This paper presents a decomposition method for speedindependent circuit design that is capable of significantly reducing the cost of synthesis. In particular, this method synthesi...
Tomohiro Yoneda, Hiroomi Onda, Chris J. Myers
OPODIS
2004
13 years 9 months ago
Lock-Free and Practical Doubly Linked List-Based Deques Using Single-Word Compare-and-Swap
Abstract. We present an efficient and practical lock-free implementation of a concurrent deque that supports parallelism for disjoint accesses and uses atomic primitives which are ...
Håkan Sundell, Philippas Tsigas
ACS
2007
13 years 7 months ago
A Topologist's View of Chu Spaces
Abstract. For a symmetric monoidal-closed category X and any object K, the category of K-Chu spaces is small-topological over X and small cotopological over Xop . Its full subcateg...
Eraldo Giuli, Walter Tholen
CORR
2008
Springer
138views Education» more  CORR 2008»
13 years 7 months ago
Capacity Bounds for the Gaussian Interference Channel
Abstract-- The capacity region of the two-user Gaussian Interference Channel (IC) is studied. Two classes of channels are considered: weak and mixed Gaussian IC. For the weak Gauss...
Abolfazl S. Motahari, Amir K. Khandani