Sciweavers

1521 search results - page 141 / 305
» Efficient Design Validation Based on Cultural Algorithms
Sort
View
SBCCI
2005
ACM
136views VLSI» more  SBCCI 2005»
15 years 3 months ago
Current mask generation: a transistor level security against DPA attacks
The physical implementation of cryptographic algorithms may leak to some attacker security information by the side channel data, as power consumption, timing, temperature or elect...
Daniel Mesquita, Jean-Denis Techer, Lionel Torres,...
AAAI
2010
14 years 11 months ago
Forest-Based Semantic Role Labeling
Parsing plays an important role in semantic role labeling (SRL) because most SRL systems infer semantic relations from 1-best parses. Therefore, parsing errors inevitably lead to ...
Hao Xiong, Haitao Mi, Yang Liu, Qun Liu
DEBU
2010
108views more  DEBU 2010»
14 years 10 months ago
Weighted Set-Based String Similarity
Consider a universe of tokens, each of which is associated with a weight, and a database consisting of strings that can be represented as subsets of these tokens. Given a query st...
Marios Hadjieleftheriou, Divesh Srivastava
TSP
2010
14 years 4 months ago
Timing estimation and resynchronization for amplify-and- forward communication systems
Abstract--This paper proposes a general framework to effectively estimate the unknown timing and channel parameters, as well as design efficient timing resynchronization algorithms...
Xiao Li, Chengwen Xing, Yik-Chung Wu, S. C. Chan
ICCAD
2001
IEEE
201views Hardware» more  ICCAD 2001»
15 years 6 months ago
An Integrated Data Path Optimization for Low Power Based on Network Flow Method
Abstract: We propose an effective algorithm for power optimization in behavioral synthesis. In previous work, it has been shown that several hardware allocation/binding problems fo...
Chun-Gi Lyuh, Taewhan Kim, Chien-Liang Liu