Sciweavers

3238 search results - page 105 / 648
» Not Enough Points Is Enough
Sort
View
ASIACRYPT
2000
Springer
14 years 2 months ago
Weil Descent of Elliptic Curves over Finite Fields of Characteristic Three
The paper shows that some of elliptic curves over finite fields of characteristic three of composite degree are attacked by a more effective algorithm than Pollard’s ρ method...
Seigo Arita
IPPS
1999
IEEE
14 years 2 months ago
A Graph Based Method for Generating the Fiedler Vector of Irregular Problems
In this paper we present new algorithms for spectral graph partitioning. Previously, the best partitioning methods were based on a combination of Combinatorial algorithms and appli...
Michael Holzrichter, Suely Oliveira
IFM
1999
Springer
101views Formal Methods» more  IFM 1999»
14 years 2 months ago
A Modular Framework for the Integration of Heterogeneous Notations and Tools
Abstract. We report on the notation and tool integration framework developed in the application-oriented research project Espress. The framework is based on a Z core and provides m...
Robert Büssow, Wolfgang Grieskamp
DFT
1997
IEEE
141views VLSI» more  DFT 1997»
14 years 2 months ago
Analysis of a Hybrid Defect-Tolerance Scheme for High-Density Memory ICs
Recent increases in the density and size of memory ICs made it ne cessary to search for new defect tolerance techniques since the traditional methods are no longer e ective enough...
Israel Koren, Zahava Koren
ICCAD
1997
IEEE
78views Hardware» more  ICCAD 1997»
14 years 2 months ago
A signature based approach to regularity extraction
Regularity extraction is an important step in the design ow of datapath-dominated circuits. This paper outlines a new method that automatically extracts regular structures from th...
Srinivasa Rao Arikati, Ravi Varadarajan