Sciweavers

1594 search results - page 232 / 319
» An Algorithm to Compute Collusion Paths
Sort
View
DAC
1994
ACM
15 years 7 months ago
Routing in a New 2-Dimensional FPGA/FPIC Routing Architecture
- This paper studies the routing problem for a new Field-Programmable Gate Array (FPGA) and Field-Programmable Interconnect Chip (FPIC) routing architecture which improves upon the...
Yachyang Sun, C. L. Liu
ICS
1994
Tsinghua U.
15 years 7 months ago
Fault-tolerant wormhole routing in tori
Abstract. We present a method to enhance wormhole routing algorithms for deadlock-free fault-tolerant routing in tori. We consider arbitrarily-located faulty blocks and assume only...
Suresh Chalasani, Rajendra V. Boppana
IWAN
2000
Springer
15 years 6 months ago
Active Concealment for Internet Speech Transmission
Recently, active networks have been highlighted as a key enabling technology to obtain immense flexibility in terms of network deployment, configurability, and packet processing. E...
Long Le, Henning Sanneck, Georg Carle, Tohru Hoshi
ARITH
2005
IEEE
15 years 5 months ago
Quasi-Pipelined Hash Circuits
Hash functions are an important cryptographic primitive. They are used to obtain a fixed-size fingerprint, or hash value, of an arbitrary long message. We focus particularly on ...
Marco Macchetti, Luigi Dadda
ICCAD
2010
IEEE
186views Hardware» more  ICCAD 2010»
15 years 1 months ago
Efficient state space exploration: Interleaving stateless and state-based model checking
State-based model checking methods comprise computing and storing reachable states, while stateless model checking methods directly reason about reachable paths using decision proc...
Malay K. Ganai, Chao Wang, Weihong Li