Sciweavers

298 search results - page 33 / 60
» Abstract Models of Transfinite Reductions
Sort
View
81
Voted
STACS
2007
Springer
15 years 4 months ago
On the Automatic Analysis of Recursive Security Protocols with XOR
Abstract. In many security protocols, such as group protocols, principals have to perform iterative or recursive computations. We call such protocols recursive protocols. Recently,...
Ralf Küsters, Tomasz Truderung
DATE
2003
IEEE
130views Hardware» more  DATE 2003»
15 years 3 months ago
Noise Macromodel for Radio Frequency Integrated Circuits
† Noise performance is a critical analog and RF circuit design constraint, and can impact the selection of the IC system-level architecture. It is therefore imperative that some ...
Yang Xu, Xin Li, Peng Li, Lawrence T. Pileggi
ICCAD
1996
IEEE
77views Hardware» more  ICCAD 1996»
15 years 2 months ago
Power optimization in disk-based real-time application specific systems
While numerous power optimization techniques have been at all levels of design process abstractions for electronic components, until now, power minimization in mixed mechanical-el...
Inki Hong, Miodrag Potkonjak
ENTCS
2006
151views more  ENTCS 2006»
14 years 10 months ago
Extending C for Checking Shape Safety
The project Safe Pointers by Graph Transformation at the University of York has developed a method for specifying the shape of pointer-data structures by graph reduction, and a st...
Mike Dodds, Detlef Plump
TCAD
2010
94views more  TCAD 2010»
14 years 5 months ago
An Efficient Projector-Based Passivity Test for Descriptor Systems
Abstract--An efficient passivity test based on canonical projector techniques is proposed for descriptor systems (DSs) widely encountered in circuit and system modeling. The test f...
Zheng Zhang, Ngai Wong