Sciweavers

1188 search results - page 194 / 238
» Arithmetic Fuzzy Models
Sort
View
SAT
2009
Springer
153views Hardware» more  SAT 2009»
15 years 4 months ago
Does Advice Help to Prove Propositional Tautologies?
One of the starting points of propositional proof complexity is the seminal paper by Cook and Reckhow [6], where they defined propositional proof systems as poly-time computable f...
Olaf Beyersdorff, Sebastian Müller
ICIP
2006
IEEE
15 years 3 months ago
Lossless Compression of Microarray Images
During the past years, the development of microarray technology has been remarkable, and it is becoming a daily tool in many genomic research laboratories. The widespread adoption...
António J. R. Neves, Armando J. Pinho
TACAS
2005
Springer
120views Algorithms» more  TACAS 2005»
15 years 3 months ago
SATABS: SAT-Based Predicate Abstraction for ANSI-C
SAT-based Predicate Abstraction for ANSI-C Edmund Clarke1 Daniel Kroening2 Natasha Sharygina1,3 Karen Yorav4 1 Carnegie Mellon University, School of Computer Science 2 ETH Zuerich,...
Edmund M. Clarke, Daniel Kroening, Natasha Sharygi...
ISLPED
2004
ACM
124views Hardware» more  ISLPED 2004»
15 years 3 months ago
The design of a low power asynchronous multiplier
In this paper we investigate the statistics of multiplier operands and identify two characteristics of their distribution that have important consequences for the design of low po...
Yijun Liu, Stephen B. Furber
SACRYPT
2004
Springer
105views Cryptology» more  SACRYPT 2004»
15 years 3 months ago
Provably Secure Masking of AES
A general method to secure cryptographic algorithm implementations against side-channel attacks is the use of randomization techniques and, in particular, masking. Roughly speaking...
Johannes Blömer, Jorge Guajardo, Volker Krumm...