Sciweavers

27 search results - page 4 / 6
» Embedding Chaos
Sort
View
CODES
2005
IEEE
15 years 3 months ago
A power estimation methodology for systemC transaction level models
Majority of existing works on system level power estimation have focused on the processor, while there are very few that address power consumption of peripherals in a SoC. With th...
Nagu R. Dhanwada, Ing-Chao Lin, Vijay Narayanan
ASIACRYPT
2000
Springer
15 years 1 months ago
Construction of Hyperelliptic Curves with CM and Its Application to Cryptosystems
Abstract. Construction of secure hyperelliptic curves is of most important yet most difficult problem in design of cryptosystems based on the discrete logarithm problems on hyperel...
Jinhui Chao, Kazuto Matsuo, Hiroto Kawashiro, Shig...
ICCAD
2010
IEEE
186views Hardware» more  ICCAD 2010»
14 years 7 months ago
Efficient state space exploration: Interleaving stateless and state-based model checking
State-based model checking methods comprise computing and storing reachable states, while stateless model checking methods directly reason about reachable paths using decision proc...
Malay K. Ganai, Chao Wang, Weihong Li
96
Voted
HICSS
2011
IEEE
201views Biometrics» more  HICSS 2011»
14 years 1 months ago
Negotiating Social Belonging: Online, Offline, and In-Between
This study investigates contemporary college students’ social behavior on- and offline. Although being socially active typically enhances access to resources embedded in social ...
Michael A. Steafnone, Yu Chao Huang, Derek Lackaff
ICASSP
2011
IEEE
14 years 1 months ago
Bilingual acoustic modeling with state mapping and three-stage adaptation for transcribing unbalanced code-mixed lectures
This paper presents a bilingual acoustic modeling approach for transcribing Mandarin-English code-mixed lectures with highly unbalanced language distribution. Special terminologie...
Ching-feng Yeh, Liang-Che Sun, Chao-Yu Huang, Lin-...