We present a technique for the analysis and re-synthesis of 2D arrangements of stroke-based vector elements. The capture of an artist’s style by the sole posterior analysis of h...
CTC is a toy cipher designed in order to assess the strength of algebraic attacks. While the structure of CTC is deliberately weak with respect to algebraic attacks, it was claimed...
We apply evolutionary computation to calibrate the parameters of a morphogenesis model of Drosophila early development. The model aims to describe the establishment of the steady g...
The research community has witnessed a large interest in monitoring large scale distributed systems. In these applications typically we wish to monitor a global system condition wh...
Ali Abbasi, Ahmad Khonsari, Mohammad Sadegh Talebi
— Memories are increasingly dominating Systems on Chip (SoC) designs and thus contribute a large percentage of the total system’s power dissipation, area and reliability. In th...
Amin Khajeh, Aseem Gupta, Nikil Dutt, Fadi J. Kurd...