Sciweavers

643 search results - page 73 / 129
» Merge-Based Computation of Minimal Generators
Sort
View
ICCAD
2005
IEEE
144views Hardware» more  ICCAD 2005»
14 years 6 months ago
An exact algorithm for the maximal sharing of partial terms in multiple constant multiplications
— In this paper we propose an exact algorithm that maximizes the sharing of partial terms in Multiple Constant Multiplication (MCM) operations. We model this problem as a Boolean...
Paulo F. Flores, José C. Monteiro, Eduardo ...
SASO
2008
IEEE
14 years 3 months ago
A Framework for Self-Protecting Cryptographic Key Management
Demands to match security with performance in Web applications where access to shared data needs to be controlled dynamically make self-protecting security schemes attractive. Yet...
Anne V. D. M. Kayem, Patrick Martin, Selim G. Akl,...
ICDM
2003
IEEE
140views Data Mining» more  ICDM 2003»
14 years 2 months ago
Mining Frequent Itemsets in Distributed and Dynamic Databases
Traditional methods for frequent itemset mining typically assume that data is centralized and static. Such methods impose excessive communication overhead when data is distributed...
Matthew Eric Otey, Chao Wang, Srinivasan Parthasar...
ITC
2003
IEEE
148views Hardware» more  ITC 2003»
14 years 2 months ago
Linearity Testing of Precision Analog-to-Digital Converters Using Stationary Nonlinear Inputs
As the performance of Analog-to-Digital Converters continues to improve, it is becoming more challenging and costly to develop sufficiently fast and low-drift signal generators th...
Le Jin, Kumar L. Parthasarathy, Turker Kuyel, Dega...
FSE
1998
Springer
131views Cryptology» more  FSE 1998»
14 years 1 months ago
Cryptanalysis of TWOPRIME
Ding et al [DNRS97] propose a stream generator based on several layers. We present several attacks. First, we observe that the non-surjectivity of a linear combination step allows ...
Don Coppersmith, David Wagner, Bruce Schneier, Joh...