Sciweavers

2076 search results - page 272 / 416
» Functional logic overloading
Sort
View
ISMVL
2000
IEEE
124views Hardware» more  ISMVL 2000»
15 years 7 months ago
Silicon Single-Electron Devices and Their Applications
We have developed two novel methods of fabricating very small Si single-electron transistors (SETs), called PAtternDependent OXidation (PADOX) and Vertical PAttern-Dependent OXida...
Yasuo Takahashi, Akira Fujiwara, Yukinori Ono, Kat...
ITC
2000
IEEE
101views Hardware» more  ITC 2000»
15 years 7 months ago
Which concurrent error detection scheme to choose ?
Concurrent error detection (CED) techniques (based on hardware duplication, parity codes, etc.) are widely used to enhance system dependability. All CED techniques introduce some ...
Subhasish Mitra, Edward J. McCluskey
CHES
2000
Springer
75views Cryptology» more  CHES 2000»
15 years 7 months ago
A 155 Mbps Triple-DES Network Encryptor
The presented Triple-DES encryptor is a single-chip solution to encrypt network communication. It is optimized for throughput and fast switching between virtual connections like fo...
Herbert Leitold, Wolfgang Mayerwieser, Udo Payer, ...
ICCAD
1994
IEEE
114views Hardware» more  ICCAD 1994»
15 years 7 months ago
Performance-driven synthesis of asynchronous controllers
We examine the implications of a new hazard-free combinational logic synthesis method [8], which generates multiplexor trees from binary decision diagrams (BDDs) -- representation...
Kenneth Y. Yun, Bill Lin, David L. Dill, Srinivas ...
RSCTC
1993
Springer
96views Fuzzy Logic» more  RSCTC 1993»
15 years 7 months ago
Trusting an Information Agent
: While the common kinds of uncertainties in databases (e.g., null values, disjunction, corrupt/missing data, domain mismatch, etc.) have been extensively studied, a relatively une...
Hasan M. Jamil, Fereidoon Sadri