Sciweavers

526 search results - page 60 / 106
» On circularly symmetric functions
Sort
View
TCAD
2008
124views more  TCAD 2008»
13 years 9 months ago
An Anytime Algorithm for Generalized Symmetry Detection in ROBDDs
Detecting symmetries has many applications in logic synthesis that include, amongst other things, technology mapping, deciding equivalence of Boolean functions when the input corre...
Neil Kettle, Andy King
IJNSEC
2011
167views more  IJNSEC 2011»
13 years 4 months ago
New Real Time Multicast Authentication Protocol
Multicast gives professional large-scale content distribution by providing an efficient transport mechanism for one-to-many and many-to-many communications. There is a number of s...
Riham Abdellatif, Heba Kamal Aslan, Salwa H. Elram...
IACR
2011
127views more  IACR 2011»
12 years 9 months ago
Corrigendum to: The Cube Attack on Stream Cipher Trivium and Quadraticity Tests
In 2008 I. Dinur and A. Shamir presented a new type of algebraic attack on symmetric ciphers named cube attack. The method has been applied to reduced variants of stream ciphers T...
Piotr Mroczkowski, Janusz Szmidt
ICIP
2001
IEEE
14 years 11 months ago
Disparity map restoration by integration of confidence in Markov random fields models
This paper proposes some Markov Random Field (MRF) models for restoration of stereo disparity maps. The main aspect is the use of confidence maps provided by the Symmetric Multipl...
Andrea Fusiello, Umberto Castellani, Vittorio Muri...
ICRA
2009
IEEE
92views Robotics» more  ICRA 2009»
14 years 4 months ago
I-Bug: An intensity-based bug algorithm
— This paper introduces a sensor-based planning algorithm that uses less sensing information than any others within the family of bug algorithms. The robot is unable to access pr...
Kamilah Taylor, Steven M. LaValle