Sciweavers

1082 search results - page 80 / 217
» tools 2000
Sort
View
EUROMICRO
2000
IEEE
14 years 2 months ago
Continuous Discrete-Event Simulation of a Continuous-Media Server I/O Subsystem
When designing computer systems, simulation tools are used to imitate a real or proposed system. Complex, dynamic systems can be simulated without the cost and time constraints in...
Michael Weeks, Chris Bailey, Reza Sotudeh
ICIP
2000
IEEE
14 years 11 months ago
First Steps Towards a Self-Dual Morphology
Classical morphology is built up in such a way that all operators occur in pairs, e.g., dilation and erosion, opening and closing, etc. This phenomenon, which is a straightforward...
Henk J. A. M. Heijmans, Renato Keshet
DAC
2000
ACM
14 years 11 months ago
Closing the gap between ASIC and custom: an ASIC perspective
We investigate the differences in speed between applicationspecific integrated circuits and custom integrated circuits when each are implemented in the same process technology, wi...
David G. Chinnery, Kurt Keutzer
FOSSACS
2010
Springer
14 years 5 months ago
Toward a Compositional Theory of Leftist Grammars and Transformations
Leftist grammars [Motwani et al., STOC 2000] are special semi-Thue systems where symbols can only insert or erase to their left. We develop a theory of leftist grammars seen as wor...
Pierre Chambart, Ph. Schnoebelen
CRYPTO
2005
Springer
83views Cryptology» more  CRYPTO 2005»
14 years 3 months ago
A Practical Attack on a Braid Group Based Cryptographic Protocol
In this paper we present a practical heuristic attack on the Ko, Lee et al. key exchange protocol introduced at Crypto 2000 [10]. One of the ideas behind our attack is using Dehorn...
Alexei G. Myasnikov, Vladimir Shpilrain, Alexander...