Sciweavers

6434 search results - page 1161 / 1287
» Model Transformations with Reference Models
Sort
View
120
Voted
ICCAD
2000
IEEE
132views Hardware» more  ICCAD 2000»
15 years 7 months ago
Frequency Domain Analysis of Switching Noise on Power Supply Network
In this paper, we propose an approach for the analysis of power supply noise in the frequency domain for power/ground (P/G) networks of tree topologies. We model the P/G network a...
Shiyou Zhao, Kaushik Roy, Cheng-Kok Koh
128
Voted
IPPS
2000
IEEE
15 years 7 months ago
Dynamic Data Layouts for Cache-Conscious Factorization of DFT
Effective utilization of cache memories is a key factor in achieving high performance in computing the Discrete Fourier Transform (DFT). Most optimizationtechniques for computing ...
Neungsoo Park, Dongsoo Kang, Kiran Bondalapati, Vi...
128
Voted
TIME
2000
IEEE
15 years 7 months ago
Navigating through Hierarchical Change Propagation in Spatiotemporal Queries
In spatiotemporal applications, meaningful changes vary according to object type, level of detail, and nature of application. In this paper, we introduce a dynamic classification ...
Giorgos Mountrakis, Peggy Agouris, Anthony Stefani...
117
Voted
SIGMETRICS
2000
ACM
15 years 7 months ago
TCP in presence of bursty losses
In this paper we analyze the performance of a TCP-like flow control in a lossy environment. The transmission rate in the control scheme that we consider has a linear growth rate;...
Eitan Altman, Konstantin Avrachenkov, Chadi Baraka...
CRYPTO
2000
Springer
128views Cryptology» more  CRYPTO 2000»
15 years 7 months ago
The Security of All-or-Nothing Encryption: Protecting against Exhaustive Key Search
We investigate the all-or-nothing encryption paradigm which was introduced by Rivest as a new mode of operation for block ciphers. The paradigm involves composing an all-or-nothing...
Anand Desai
« Prev « First page 1161 / 1287 Last » Next »