Sciweavers

2125 search results - page 104 / 425
» Points with Type-2 Operations
Sort
View
PERCOM
2005
ACM
14 years 8 months ago
Security Analysis of Two Anonymous Authentication Protocols for Distributed Wireless Networks
In a set of distributed wireless networks, such as globally distributed cellular systems, different networks could be administered by different operators. Mobile devices subscribe...
Duncan S. Wong
ISCAS
2005
IEEE
140views Hardware» more  ISCAS 2005»
14 years 2 months ago
Low energy asynchronous architectures
: Asynchronous circuits are often presented as a means of achieving low power operation. We investigate their suitability for low-energy applications, where long battery life and d...
Ilya Obridko, Ran Ginosar
BIRTHDAY
2005
Springer
14 years 2 months ago
Main Concepts of Networks of Transformation Units with Interlinking Semantics
The aim of this paper is to introduce a modelling concept and structuring principle for rule-based systems the semantics of which is not restricted to a sequential behavior, but ca...
Dirk Janssens, Hans-Jörg Kreowski, Grzegorz R...
DATE
1998
IEEE
100views Hardware» more  DATE 1998»
14 years 1 months ago
Self-Adjusting Output Data Compression: An Efficient BIST Technique for RAMs
After write operations, BIST schemes for RAMs relying on signature analysis must compress the entire memory contents to update the reference signature. This paper introduces a new...
Vyacheslav N. Yarmolik, Sybille Hellebrand, Hans-J...
VLDB
1991
ACM
220views Database» more  VLDB 1991»
14 years 14 days ago
A Performance Evaluation of Multi-Level Transaction Management
Multi-level transactions are a variant of open nested transactions in which the subtransactions correspond to operations at different levels of a layered system architecture. The ...
Christof Hasse, Gerhard Weikum