Sciweavers

12257 search results - page 227 / 2452
» Analysis of Algorithms
Sort
View
VLSISP
2008
111views more  VLSISP 2008»
15 years 1 months ago
Design Methodology for Throughput Optimum Architectures of Hash Algorithms of the MD4-class
Abstract. In this paper we propose an architecture design methodology to optimize the throughput of MD4-based hash algorithms. The proposed methodology includes an iteration bound ...
Yong Ki Lee, Herwin Chan, Ingrid Verbauwhede
PRDC
2002
IEEE
15 years 6 months ago
A Consensus Algorithm for Synchronous Distributed Systems using Mobile Agent
In this paper, we present a consensus algorithm for synchronous distributed systems using cooperating mobile agents. The algorithm is designed within a framework for mobile agent ...
Jiannong Cao, Xianbing Wang, Siu Lo, Sajal K. Das
CSFW
1999
IEEE
15 years 6 months ago
Decision Procedures for the Analysis of Cryptographic Protocols by Logics of Belief
Belief-logic deductions are used in the analysis of cryptographic protocols. We show a new method to decide such logics. In addition to the familiar BAN logic, it is also applicab...
David Monniaux
SCAM
2003
IEEE
15 years 7 months ago
Online Cycle Detection and Difference Propagation for Pointer Analysis
This paper presents and evaluates a number of techniques to improve the execution time of interprocedural pointer analysis in the context of large C programs. The analysis is form...
David J. Pearce, Paul H. J. Kelly, Chris Hankin
ICFP
2006
ACM
16 years 1 months ago
Towards an automatic complexity analysis for generic programs
Generic libraries, such as the C++ Standard Template Library (STL), provide flexible, high-performance algorithms and data types, along with functional specifications and performa...
Kyle D. Ross