Sciweavers

2944 search results - page 120 / 589
» Improving Bound Propagation
Sort
View
FSE
2007
Springer
105views Cryptology» more  FSE 2007»
14 years 4 months ago
New Bounds for PMAC, TMAC, and XCBC
We provide new security proofs for PMAC, TMAC, and XCBC message authentication modes. The previous security bounds for these modes were σ2 /2n , where n is the block size in bits ...
Kazuhiko Minematsu, Toshiyasu Matsushima
GLVLSI
2006
IEEE
95views VLSI» more  GLVLSI 2006»
14 years 4 months ago
Test generation using SAT-based bounded model checking for validation of pipelined processors
Functional verification is one of the major bottlenecks in microprocessor design. Simulation-based techniques are the most widely used form of processor verification. Efficient ...
Heon-Mo Koo, Prabhat Mishra
ICRA
2006
IEEE
123views Robotics» more  ICRA 2006»
14 years 4 months ago
Bounding Uncertainty in EKF-SLAM: the Robocentric Local Approach
— This paper addresses the consistency issue of the Extended Kalman Filter approach to the simultaneous localization and mapping (EKF-SLAM) problem. Linearization of the inherent...
Ruben Martinez-Cantin, José A. Castellanos
CAV
2004
Springer
128views Hardware» more  CAV 2004»
14 years 3 months ago
Proving More Properties with Bounded Model Checking
Bounded Model Checking, although complete in theory, has been thus far limited in practice to falsification of properties that were not invariants. In this paper we propose a term...
Mohammad Awedh, Fabio Somenzi
STACS
2004
Springer
14 years 3 months ago
A Lower Bound on the Competitive Ratio of Truthful Auctions
We study a class of single-round, sealed-bid auctions for a set of identical items. We adopt the worst case competitive framework defined by [1,2] that compares the profit of an ...
Andrew V. Goldberg, Jason D. Hartline, Anna R. Kar...