Sciweavers

2607 search results - page 359 / 522
» Complete Functional Synthesis
Sort
View
EUROCRYPT
2006
Springer
15 years 7 months ago
Private Circuits II: Keeping Secrets in Tamperable Circuits
Abstract. Motivated by the problem of protecting cryptographic hardware, we continue the investigation of private circuits initiated in [16]. In this work, our aim is to construct ...
Yuval Ishai, Manoj Prabhakaran, Amit Sahai, David ...
FPGA
2000
ACM
128views FPGA» more  FPGA 2000»
15 years 7 months ago
Factoring large numbers with programmable hardware
The fastest known algorithms for factoring large numbers share a core sieving technique. The sieving cores find numbers that are completely factored over a prime base set raised t...
Hea Joung Kim, William H. Mangione-Smith
GECCO
2000
Springer
138views Optimization» more  GECCO 2000»
15 years 7 months ago
Domain Knowledge and Representation in Genetic Algorithms for Real World Scheduling Problems
This paper discusses the issues that arise in the design and implementation of an industrialstrength evolutionary-based system for the optimization of the monthly work schedules f...
Ioannis T. Christou, Armand Zakarian
ICRE
2000
IEEE
15 years 7 months ago
A Lightweight Approach to Consistency of Scenarios and Class Models
Today, object-oriented requirements specifications typically combine a scenario (or use case) model and a class model for expressing functional requirements. With any such combina...
Martin Glinz
PVM
2000
Springer
15 years 7 months ago
Runtime Checking of Datatype Signatures in MPI
Abstract. The MPI standard provides a way to send and receive complex combinations of datatypes (e.g., integers and doubles) with a single communication operation. The MPI standard...
William Gropp