Sciweavers

612 search results - page 89 / 123
» Bounded model checking for knowledge and real time
Sort
View
ISQED
2003
IEEE
133views Hardware» more  ISQED 2003»
15 years 3 months ago
Impact of Interconnect Pattern Density Information on a 90nm Technology ASIC Design Flow
The importance of an interconnect pattern density model in ASIC design flow for a 90nm technology is presented. It is shown that performing the timing analysis at the worst-case c...
Payman Zarkesh-Ha, S. Lakshminarayann, Ken Doniger...
51
Voted
FC
2010
Springer
135views Cryptology» more  FC 2010»
15 years 1 months ago
Multichannel Protocols to Prevent Relay Attacks
A number of security systems, from Chip-and-PIN payment cards to contactless subway and train tokens, as well as secure localization systems, are vulnerable to relay attacks. Encry...
Frank Stajano, Ford-Long Wong, Bruce Christianson
IJCINI
2007
96views more  IJCINI 2007»
14 years 9 months ago
The Theoretical Framework of Cognitive Informatics
Cognitive Informatics (CI) is a transdisciplinary enquiry of the internal information processing mechanisms and processes of the brain and natural intelligence shared by almost al...
Yingxu Wang
75
Voted
KDD
2010
ACM
214views Data Mining» more  KDD 2010»
15 years 1 months ago
Neighbor query friendly compression of social networks
Compressing social networks can substantially facilitate mining and advanced analysis of large social networks. Preferably, social networks should be compressed in a way that they...
Hossein Maserrat, Jian Pei
77
Voted
PODC
2009
ACM
15 years 10 months ago
Coloring unstructured wireless multi-hop networks
We present a randomized coloring algorithm for the unstructured radio network model, a model comprising autonomous nodes, asynchronous wake-up, no collision detection and an unkno...
Johannes Schneider, Roger Wattenhofer