Sciweavers

219 search results - page 44 / 44
» Symmetries of Symmetry Breaking Constraints
Sort
View
HOST
2008
IEEE
13 years 11 months ago
Place-and-Route Impact on the Security of DPL Designs in FPGAs
—Straightforward implementations of cryptographic algorithms are known to be vulnerable to attacks aimed not at the mathematical structure of the cipher but rather at the weak po...
Sylvain Guilley, Sumanta Chaudhuri, Jean-Luc Dange...
HLK
2003
IEEE
13 years 10 months ago
Bayesian Reconstruction of 3D Shapes and Scenes From A Single Image
It’s common experience for human vision to perceive full 3D shape and scene from a single 2D image with the occluded parts “filled-in” by prior visual knowledge. In this pa...
Feng Han, Song Chun Zhu
CAV
2000
Springer
197views Hardware» more  CAV 2000»
13 years 9 months ago
Bounded Model Construction for Monadic Second-Order Logics
Address: Abstraction, Composition, Symmetry, and a Little Deduction: The Remedies to State Explosion . . . . . . . . . . . . . . . . . . . . . . . . . . 1 A. Pnueli Invited Address...
Abdelwaheb Ayari, David A. Basin
BMCBI
2004
97views more  BMCBI 2004»
13 years 5 months ago
Global features of sequences of bacterial chromosomes, plasmids and phages revealed by analysis of oligonucleotide usage pattern
Background: Oligonucleotide frequencies were shown to be conserved signatures for bacterial genomes, however, the underlying constraints have yet not been resolved in detail. In t...
Oleg N. Reva, Burkhard Tümmler