Sciweavers

532 search results - page 46 / 107
» New Results on the Complexity of the Middle Bit of Multiplic...
Sort
View
WCNC
2008
IEEE
14 years 3 months ago
A Low Latency Scheme for Bulk RFID Tag Reading
—Passive RFID tags transmit their ID information to a tag reader upon energization by the reader. These transmitted signals, or IDs, may collide if multiple tags transmit their I...
Erik F. Golen, Nirmala Shenoy, Xiaojun Cao
ASIACRYPT
2010
Springer
13 years 7 months ago
Rotational Rebound Attacks on Reduced Skein
Abstract. In this paper we combine a recent rotational cryptanalysis with the rebound attack, which results in the best cryptanalysis of Skein, a candidate for the SHA-3 competitio...
Dmitry Khovratovich, Ivica Nikolic, Christian Rech...
FLAIRS
2006
13 years 10 months ago
Robot Navigation Using Integrated Retrieval of Behaviors and Routes
RUPART1 is a hybrid robot control system for navigating a real-world, academic building. Hybrid robot control systems provide robust low-level navigation together with strategic p...
Susan Eileen Fox, Peter Anderson-Sprecher
DFT
1999
IEEE
119views VLSI» more  DFT 1999»
14 years 1 months ago
RAMSES: A Fast Memory Fault Simulator
In this paper, we present a memory fault simulator called the Random Access Memory Simulator for Error Screening (RAMSES). Although it was designed based on some wellknown memory ...
Chi-Feng Wu, Chih-Tsun Huang, Cheng-Wen Wu
ISCAS
2003
IEEE
113views Hardware» more  ISCAS 2003»
14 years 2 months ago
Optimum word length allocation for multipliers of integer DCT
Recently, the integer DCT (Int-DCT), which has the rounding operations in the lifting structure, is attracting many researchers' attention as an effective method for DCT base...
Masahiro Iwahashi, Osamu Nishida, Somchart Chokcha...