Sciweavers

511 search results - page 102 / 103
» More Precise Partition Abstractions
Sort
View
DATE
2010
IEEE
118views Hardware» more  DATE 2010»
13 years 6 months ago
Exploiting multiple switch libraries in topology synthesis of on-chip interconnection network
Abstract—On-chip interconnection network is a crucial design component in high-performance System-on-Chips (SoCs). Many of previous works have focused on the automation of its to...
Minje Jun, Sungroh Yoon, Eui-Young Chung
ICA
2010
Springer
13 years 6 months ago
Second Order Subspace Analysis and Simple Decompositions
Abstract. The recovery of the mixture of an N-dimensional signal generated by N independent processes is a well studied problem (see e.g. [1,10]) and robust algorithms that solve t...
Harold W. Gutch, Takanori Maehara, Fabian J. Theis
LATINCRYPT
2010
13 years 5 months ago
Cryptanalysis of the Hidden Matrix Cryptosystem
Abstract. In this paper, we present an efficient cryptanalysis of the socalled HM cryptosystem which was published at Asiacrypt’1999, and one perturbed version of HM. Until now, ...
Jean-Charles Faugère, Antoine Joux, Ludovic...
RV
2010
Springer
127views Hardware» more  RV 2010»
13 years 5 months ago
You Should Better Enforce Than Verify
This tutorial deals with runtime enforcement which is an extension of runtime verification aiming to circumvent misbehaviors of systems. After an historical overview of previous a...
Yliès Falcone
ICSR
2009
Springer
13 years 5 months ago
Reusing Patterns through Design Refinement
Abstract. Refinement concepts, such as procedural and data refinement, are among the most important ideas of software engineering. In this paper, we investigate the idea of design ...
Jason O. Hallstrom, Neelam Soundarajan