Sciweavers

57 search results - page 6 / 12
» dc 2007
Sort
View
IJNSEC
2007
147views more  IJNSEC 2007»
13 years 7 months ago
A Genetic Algorithm for Cryptanalysis of DES-8
Various cryptosystems exploit exhaustive techniques to search, missing-the-mark, key space. Such search techniques should be guided in order to be computationally adequate. Here, ...
Hasan Mohammed Hasan Husein, Bayoumi I. Bayoumi, F...
ICCAD
2007
IEEE
130views Hardware» more  ICCAD 2007»
14 years 4 months ago
Analysis and optimization of power-gated ICs with multiple power gating configurations
- Power gating is an efficient technique for reducing leakage power in electronic devices by disconnecting blocks idle for long periods of time from the power supply. Disconnecting...
Aida Todri, Malgorzata Marek-Sadowska, Shih-Chieh ...
PERCOM
2007
ACM
14 years 7 months ago
Achieving Flexible Cache Consistency for Pervasive Internet Access
Caching is an important technique to support pervasive Internet access. Cache consistency measures the deviation between the cached data and the source data. In mobile computing e...
Yu Huang 0002, Jiannong Cao, Zhijun Wang, Beihong ...
IJCAI
2001
13 years 8 months ago
Distributed Monitoring of Hybrid Systems: A model-directed approach
This paper presents an efficient online mode estimation algorithm for a class of sensor-rich, distributed embedded systems, the so-called hybrid systems. A central problem in dist...
Feng Zhao, Xenofon D. Koutsoukos, Horst W. Haussec...
AUTOMATICA
2005
145views more  AUTOMATICA 2005»
13 years 7 months ago
Averaging analysis of periodically forced fluid networks
For a lumped parameter model of a flow network driven by a periodic generator, we apply averaging to find an approximate solution and analyze its stability. The approximate soluti...
Olga I. Koroleva, Miroslav Krstic