Sciweavers

159 search results - page 8 / 32
» Specified Blocks
Sort
View
ASIAN
2009
Springer
308views Algorithms» more  ASIAN 2009»
13 years 11 months ago
Automated Security Proof for Symmetric Encryption Modes
Abstract. We presents a compositional Hoare logic for proving semantic security of modes of operation for symmetric key block ciphers. We propose a simple programming language to s...
Martin Gagné, Pascal Lafourcade, Yassine La...
BIRTHDAY
1999
Springer
14 years 2 months ago
Compilation and Synthesis for Real-Time Embedded Controllers
Abstract. This article provides an overview over two constructive approaches to provably correct hard real-time code generation where hard real-time code is generated from abstract...
Martin Fränzle, Markus Müller-Olm
TIT
2002
107views more  TIT 2002»
13 years 9 months ago
Constrained systems with unconstrained positions
We develop methods for analyzing and constructing combined modulation/error-correctiong codes (ECC codes), in particular codes that employ some form of reversed concatenation and w...
Jorge Campello de Souza, Brian H. Marcus, Richard ...
ISQED
2009
IEEE
111views Hardware» more  ISQED 2009»
14 years 4 months ago
Efficient statistical analysis of read timing failures in SRAM circuits
A system-level statistical analysis methodology is described that captures the impact of inter- and intra-die process variations for read timing failures in SRAM circuit blocks. U...
Soner Yaldiz, Umut Arslan, Xin Li, Larry T. Pilegg...
CISS
2007
IEEE
14 years 4 months ago
Wireless Multicasting with Channel Uncertainty
— We consider wireless multicasting where a source of common information is transmitted to a group of receivers over block fading channels. Communication between the transmitter ...
Jie Luo, Anthony Ephremides