Sciweavers

397 search results - page 41 / 80
» Inversion in Time
Sort
View
SODA
2008
ACM
83views Algorithms» more  SODA 2008»
13 years 11 months ago
Splay trees, Davenport-Schinzel sequences, and the deque conjecture
We introduce a new technique to bound the asymptotic performance of splay trees. The basic idea is to transcribe, in an indirect fashion, the rotations performed by the splay tree...
Seth Pettie
DAC
2001
ACM
14 years 10 months ago
Concurrent Error Detection of Fault-Based Side-Channel Cryptanalysis of 128-Bit Symmetric Block Ciphers
: Fault-based side channel cryptanalysis is very effective against symmetric and asymmetric encryption algorithms. Although straightforward hardware and time redundancy based concu...
Ramesh Karri, Kaijie Wu, Piyush Mishra, Yongkook K...
ARITH
2009
IEEE
14 years 4 months ago
Selected RNS Bases for Modular Multiplication
The selection of the elements of the bases in an RNS modular multiplication method is crucial and has a great impact in the overall performance. This work proposes specific sets ...
Jean-Claude Bajard, Marcelo E. Kaihara, Thomas Pla...
ICCTA
2007
IEEE
14 years 4 months ago
Deformation Correction in Brain MRI Using Mutual Information and Genetic Algorithm
During MR imaging, the image of the object may get deformed due to the slope between the MR probe and the object. It is in general undesirable, particularly for 3D imaging. In thi...
Pradipta Maji, Bhabatosh Chanda, Malay Kumar Kundu...
DATE
2006
IEEE
102views Hardware» more  DATE 2006»
14 years 3 months ago
Pseudorandom functional BIST for linear and nonlinear MEMS
Pseudorandom test techniques are widely used for measuring the impulse response (IR) for linear devices and Volterra kernels for nonlinear devices, especially in the acoustics dom...
Achraf Dhayni, Salvador Mir, Libor Rufer, Ahc&egra...