Sciweavers

957 search results - page 115 / 192
» Addition Chain Heuristics
Sort
View
JMLR
2010
169views more  JMLR 2010»
14 years 6 months ago
Matrix-Variate Dirichlet Process Mixture Models
We are concerned with a multivariate response regression problem where the interest is in considering correlations both across response variates and across response samples. In th...
Zhihua Zhang, Guang Dai, Michael I. Jordan
DAC
2005
ACM
16 years 26 days ago
Enhanced leakage reduction Technique by gate replacement
Input vector control (IVC) technique utilizes the stack effect in CMOS circuit to apply the minimum leakage vector (MLV) to the circuit at the sleep mode to reduce leakage. Additi...
Lin Yuan, Gang Qu
CODES
2009
IEEE
15 years 6 months ago
FlexRay schedule optimization of the static segment
The FlexRay bus is the prospective automotive standard communication system. For the sake of a high flexibility, the protocol includes a static time-triggered and a dynamic event...
Martin Lukasiewycz, Michael Glaß, Jürge...
VTS
2007
IEEE
203views Hardware» more  VTS 2007»
15 years 6 months ago
Multiple Bit Upset Tolerant Memory Using a Selective Cycle Avoidance Based SEC-DED-DAEC Code
Conventional error correcting code (ECC) schemes used in memories and caches cannot correct double bit errors caused by a single event upset (SEU). As memory density increases, mu...
Avijit Dutta, Nur A. Touba
CHES
2005
Springer
108views Cryptology» more  CHES 2005»
15 years 5 months ago
Further Hidden Markov Model Cryptanalysis
We extend the model of Karlof and Wagner for modelling side channel attacks via Input Driven Hidden Markov Models (IDHMM) to the case where not every state corresponds to a single ...
P. J. Green, Richard Noad, Nigel P. Smart