Sciweavers

8 search results - page 2 / 2
» Two enumerative results on cycles of permutations
Sort
View
APCSAC
2004
IEEE
13 years 9 months ago
Validating Word-Oriented Processors for Bit and Multi-word Operations
We examine secure computing paradigms to identify any new architectural challenges for future general-purpose processors. Some essential security functions can be provided by diffe...
Ruby B. Lee, Xiao Yang, Zhijie Shi
CIBCB
2007
IEEE
13 years 11 months ago
Evolving Extremal Epidemic Networks
The susceptible, infected, removed model for epidemics assumes that the population in which the epidemic takes place is well mixed. This strong assumption can be relaxed by permit...
Dan Ashlock, Fatemeh Jafargholi
WSC
1998
13 years 6 months ago
Exploiting Multiple Regeneration Sequences in Simulation Output Analysis
The regenerative method of simulation output analysis exploits the regenerative structure of a stochastic process to break up a path into independent and identically distributed c...
James M. Calvin, Marvin K. Nakayama