Sciweavers

1686 search results - page 175 / 338
» Higher Order Deforestation
Sort
View
ICFEM
2005
Springer
15 years 10 months ago
Using Three-Valued Logic to Specify and Verify Algorithms of Computational Geometry
Many safety-critical systems deal with geometric objects. Reasoning about the correctness of such systems is mandatory and requires the use of basic definitions of geometry for th...
Jens Brandt, Klaus Schneider
ICNC
2005
Springer
15 years 10 months ago
A Time-Series Decomposed Model of Network Traffic
: Traffic behavior in a large-scale network can be viewed as a complicated non-linear system, so it is very difficult to describe the long-term network traffic behavior in a large-...
Guang Cheng, Jian Gong, Wei Ding 0001
LPAR
2005
Springer
15 years 10 months ago
Functional Correctness Proofs of Encryption Algorithms
Abstract. We discuss a collection of mechanized formal proofs of symmetric key block encryption algorithms (AES, MARS, Twofish, RC6, Serpent, IDEA, and TEA), performed in an imple...
Jianjun Duan, Joe Hurd, Guodong Li, Scott Owens, K...
NOLISP
2005
Springer
15 years 10 months ago
Advanced Methods for Glottal Wave Extraction
Abstract. Glottal inverse filtering is a technique used to derive the glottal waveform during voiced speech. Closed phase inverse filtering (CPIF) is a common approach for achiev...
Jacqueline Walker, Peter J. Murphy
SAMOS
2005
Springer
15 years 10 months ago
Automatic FIR Filter Generation for FPGAs
This paper presents a new tool for the automatic generation of highly parallelized Finite Impulse Response (FIR) filters. In this approach we follow our PARO design methodology. P...
Holger Ruckdeschel, Hritam Dutta, Frank Hannig, J&...