Sciweavers

401 search results - page 7 / 81
» Symmetric Subresultants and Applications
Sort
View
COMPSYSTECH
2010
13 years 7 months ago
An approach for node identification and key management in sensor grids
Security of sensor grids is important especially for surveillance, military and medical applications. The paper addresses methods for two security features. First, an approach for ...
Iliya Georgiev
ASPDAC
2006
ACM
114views Hardware» more  ASPDAC 2006»
14 years 1 months ago
High level equivalence symmetric input identification
Symmetric input identification is an important technique in logic synthesis. Previous approaches deal with this problem by building BDDs and developing algorithms to determine symm...
Ming-Hong Su, Chun-Yao Wang
CTRSA
2011
Springer
189views Cryptology» more  CTRSA 2011»
12 years 11 months ago
Online Ciphers from Tweakable Blockciphers
Abstract. Online ciphers are deterministic length-preserving permutations EK : ({0, 1}n )+ → ({0, 1}n )+ where the i-th block of ciphertext depends only on the first i blocks of...
Phillip Rogaway, Haibin Zhang
ICRA
2009
IEEE
116views Robotics» more  ICRA 2009»
13 years 5 months ago
Kinematic analysis and optimal design of a 3T1R type parallel mechanism
In previous studies on 4-DOF parallel mechanisms with four sub-chains, only symmetric arrangement of those four chains connected to the top plate was considered. Such symmetric sha...
Sung Mok Kim, Whee Kuk Kim, Byung-Ju Yi
ISCAS
2006
IEEE
124views Hardware» more  ISCAS 2006»
14 years 1 months ago
A 12-bit 300 MHz CMOS DAC for high-speed system applications
—This paper describes a 12-bit 300 MHz CMOS DAC for high-speed system applications. The proposed DAC consists of a unit current-cell matrix for 8 MSBs and a binaryweighted array ...
Weining Ni, Xueyang Geng, Yin Shi, Foster F. Dai