Sciweavers

9316 search results - page 222 / 1864
» Analysis of traceback techniques
Sort
View
DATE
2007
IEEE
138views Hardware» more  DATE 2007»
15 years 11 months ago
An ADC-BiST scheme using sequential code analysis
This paper presents a built-in self-test (BiST) scheme for analog to digital converters (ADC) based on a linear ramp generator and efficient output analysis. The proposed analysi...
Erdem Serkan Erdogan, Sule Ozev
WISA
2007
Springer
15 years 11 months ago
Iteration Bound Analysis and Throughput Optimum Architecture of SHA-256 (384, 512) for Hardware Implementations
Abstract. The hash algorithm forms the basis of many popular cryptographic protocols and it is therefore important to find throughput optimal implementations. Though there have be...
Yong Ki Lee, Herwin Chan, Ingrid Verbauwhede
VISUALIZATION
2005
IEEE
15 years 11 months ago
2D Asymmetric Tensor Analysis
Analysis of degenerate tensors is a fundamental step in finding the topological structures and separatrices in tensor fields. Previous work in this area have been limited to ana...
Xiaoqiang Zheng, Alex Pang
ESOP
2001
Springer
15 years 10 months ago
Control-Flow Analysis in Cubic Time
Abstract. It is well-known that context-independent control flow analysis can be performed in cubic time for functional and object-oriented languages. Yet recent applications of c...
Flemming Nielson, Helmut Seidl
HT
2000
ACM
15 years 9 months ago
Finding linking opportunities through relationship-based analysis
Many techniques exist for analyzing information domains in preparation for systems design. No systematic technique exists, however, for analyzing a system or domain in terms of it...
Joonhee Yoo, Michael Bieber