Sciweavers

IMA
1997
Springer
88views Cryptology» more  IMA 1997»
15 years 8 months ago
Increasing Efficiency of International Key Escrow in Mutually Mistrusting Domains
This paper is concerned with key escrow protocols for use in international communications environments, where communication domains do not necessarily trust one another. It is conc...
Keith M. Martin
ICCAD
1995
IEEE
79views Hardware» more  ICCAD 1995»
15 years 8 months ago
Optimal wire sizing and buffer insertion for low power and a generalized delay model
John Lillis, Chung-Kuan Cheng, Ting-Ting Y. Lin
ICCAD
1995
IEEE
108views Hardware» more  ICCAD 1995»
15 years 8 months ago
Partitioning and reduction of RC interconnect networks based on scattering parameter macromodels
This paper presents a linear time algorithm to reduce a large RC interconnect network into subnetworks which are approximated with lower order equivalent RC circuits. The number o...
Haifang Liao, Wayne Wei-Ming Dai
ICCAD
1995
IEEE
167views Hardware» more  ICCAD 1995»
15 years 8 months ago
A novel methodology for statistical parameter extraction
IC manufacturing process variations are typically expressed in terms of joint probability density functions (jpdf’s) or as worst case combinations/corners of the device model pa...
Kannan Krishna, Stephen W. Director
ICCAD
1995
IEEE
68views Hardware» more  ICCAD 1995»
15 years 8 months ago
Generating sparse partial inductance matrices with guaranteed stability
This paper proposes a definition of magnetic vector potential that can be used to evaluate sparse partial inductance matrices. Unlike the commonly applied procedure of discarding...
Byron Krauter, Lawrence T. Pileggi