Sciweavers

3256 search results - page 555 / 652
» Mixin-Based Programming in C
Sort
View
IEICET
2006
114views more  IEICET 2006»
13 years 9 months ago
Synchronization Verification in System-Level Design with ILP Solvers
Concurrency is one of the most important issues in system-level design. Interleaving among parallel processes can cause an extremely large number of different behaviors, making de...
Thanyapat Sakunkonchak, Satoshi Komatsu, Masahiro ...
IJCSA
2006
95views more  IJCSA 2006»
13 years 9 months ago
Modeling and Formal Verification of DHCP Using SPIN
The Dynamic Host Configuration Protocol (DHCP) is a widely used communication protocol. In this paper, a portion of the protocol is chosen for modeling and verification, namely th...
Syed M. S. Islam, Mohammed H. Sqalli, Sohel Khan
IJNSEC
2006
94views more  IJNSEC 2006»
13 years 9 months ago
A Binary Redundant Scalar Point Multiplication in Secure Elliptic Curve Cryptosystems
The main back-bone operation in elliptic curve cryptosystems is scalar point multiplication. The most frequently used method implementing the scalar point multiplication which is ...
Sangook Moon
JCC
2008
132views more  JCC 2008»
13 years 9 months ago
The implementation of a fast and accurate QM/MM potential method in Amber
Abstract: Version 9 of the Amber simulation programs includes a new semi-empirical hybrid QM/MM functionality. This includes support for implicit solvent (generalized Born) and for...
Ross C. Walker, Michael F. Crowley, David A. Case
CORR
2007
Springer
104views Education» more  CORR 2007»
13 years 9 months ago
Separable convex optimization problems with linear ascending constraints
Separable convex optimization problems with linear ascending inequality and equality constraints are addressed in this paper. An algorithm that explicitly characterizes the optimum...
Arun Padakandla, Rajesh Sundaresan