Sciweavers

1116 search results - page 160 / 224
» Key Agreement Using Statically Keyed Authenticators
Sort
View
ICCAD
2006
IEEE
183views Hardware» more  ICCAD 2006»
14 years 4 months ago
Soft error derating computation in sequential circuits
Soft error tolerant design becomes more crucial due to exponential increase in the vulnerability of computer systems to soft errors. Accurate estimation of soft error rate (SER), ...
Hossein Asadi, Mehdi Baradaran Tahoori
GLOBECOM
2008
IEEE
14 years 2 months ago
A Low-Complexity Iterative Channel Estimation and Detection Technique for Doubly Selective Channels
— In this paper, we propose a low-complexity iterative joint channel estimation, detection and decoding technique for doubly selective channels. The key is a segment-by-segment f...
Qinghua Guo, Ping Li
ETS
2007
IEEE
91views Hardware» more  ETS 2007»
14 years 2 months ago
PPM Reduction on Embedded Memories in System on Chip
This paper summarizes advanced test patterns designed to target dynamic and time-related faults caused by new defect mechanisms in deep-submicron memory technologies. Such tests a...
Said Hamdioui, Zaid Al-Ars, Javier Jiménez,...
ICRA
2006
IEEE
131views Robotics» more  ICRA 2006»
14 years 1 months ago
A Practical Algorithm for Network Topology Inference
— When a network of robots or static sensors is emplaced in an environment, the spatial relationships between the sensing units must be inferred or computed for most key applicat...
Dimitri Marinakis, Gregory Dudek
CIMCA
2005
IEEE
14 years 1 months ago
Hybrid Neural Networks for Immunoinformatics
Hybrid set of optimally trained feed-forward, Hopfield and Elman neural networks were used as computational tools and were applied to immunoinformatics. These neural networks ena...
Khrizel B. Solano, Tolja Djekovic, Mohamed Zohdy