Sciweavers

234 search results - page 36 / 47
» Architecture Implementation Using the Machine Description La...
Sort
View
CHES
2008
Springer
84views Cryptology» more  CHES 2008»
14 years 11 months ago
A Real-World Attack Breaking A5/1 within Hours
Abstract. In this paper we present a real-world hardware-assisted attack on the wellknown A5/1 stream cipher which is (still) used to secure GSM communication in most countries all...
Timo Gendrullis, Martin Novotný, Andy Rupp
GECCO
2005
Springer
232views Optimization» more  GECCO 2005»
15 years 3 months ago
A hardware pipeline for function optimization using genetic algorithms
Genetic Algorithms (GAs) are very commonly used as function optimizers, basically due to their search capability. A number of different serial and parallel versions of GA exist. ...
Malay Kumar Pakhira, Rajat K. De
GECCO
2007
Springer
159views Optimization» more  GECCO 2007»
15 years 3 months ago
A systemic computation platform for the modelling and analysis of processes with natural characteristics
Computation in biology and in conventional computer architectures seem to share some features, yet many of their important characteristics are very different. To address this, [1]...
Erwan Le Martelot, Peter J. Bentley, R. Beau Lotto
DAC
2007
ACM
15 years 10 months ago
Automatic Verification of External Interrupt Behaviors for Microprocessor Design
Interrupt behaviors, especially the external ones, are difficult to verify in a microprocessor design project in that they involve both interacting hardware and software. This pap...
Fu-Ching Yang, Wen-Kai Huang, Ing-Jer Huang
ICML
1996
IEEE
15 years 10 months ago
Representing and Learning Quality-Improving Search Control Knowledge
Generating good, production-quality plans is an essential element in transforming planners from research tools into real-world applications, but one that has been frequently overl...
M. Alicia Pérez