Sciweavers

26 search results - page 3 / 6
» The behavior of linear time invariant RLC circuits
Sort
View
ASPDAC
2006
ACM
74views Hardware» more  ASPDAC 2006»
14 years 20 days ago
Macromodelling oscillators using Krylov-subspace methods
— We present an efficient method for automatically extracting unified amplitude/phase macromodels of arbitrary oscillators from their SPICE-level circuit descriptions. Such com...
Xiaolue Lai, Jaijeet S. Roychowdhury
CRYPTO
2011
Springer
280views Cryptology» more  CRYPTO 2011»
12 years 6 months ago
A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack
At CHES 2010, the new block cipher PRINTcipher was presented as a light-weight encryption solution for printable circuits [15]. The best attack to date is a differential attack [1...
Gregor Leander, Mohamed Ahmed Abdelraheem, Hoda Al...
ICCAD
2000
IEEE
124views Hardware» more  ICCAD 2000»
13 years 11 months ago
A Methodology for Verifying Memory Access Protocols in Behavioral Synthesis
— Memory is one of the most important components to be optimized in the several phases of the synthesis process. ioral synthesis, a memory is viewed as an abstract construct whic...
Gernot Koch, Taewhan Kim, Reiner Genevriere
ASYNC
1998
IEEE
91views Hardware» more  ASYNC 1998»
13 years 11 months ago
Predicting Performance of Micropipelines Using Charlie Diagrams
A technique is presented to predict the performance behavior of control circuits for a linear FIFO. The control circuit consists of a linear chain of RendezVous elements, also cal...
Jo C. Ebergen, Scott Fairbanks, Ivan E. Sutherland
GLVLSI
2003
IEEE
219views VLSI» more  GLVLSI 2003»
13 years 12 months ago
Buffer sizing for minimum energy-delay product by using an approximating polynomial
This paper first presents an accurate and efficient method of estimating the short circuit energy dissipation and the output transition time of CMOS buffers. Next the paper descri...
Chang Woo Kang, Soroush Abbaspour, Massoud Pedram