Sciweavers

10910 search results - page 158 / 2182
» Input modeling using a computer algebra system
Sort
View
JHSN
2006
267views more  JHSN 2006»
14 years 10 months ago
Client-side access control enforcement using trusted computing and PEI models
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard ...
Ravi S. Sandhu, Xinwen Zhang, Kumar Ranganathan, M...
DATE
2007
IEEE
100views Hardware» more  DATE 2007»
14 years 10 months ago
A new pipelined implementation for minimum norm sorting used in square root algorithm for MIMO-VBLAST systems
Multiple Input - Multiple Output (MIMO) wireless technology involves highly complex vectors and matrix computations which are directly related to increased power and area consumpt...
Zahid Khan, Tughrul Arslan, John S. Thompson, Ahme...
ARITH
2005
IEEE
15 years 3 months ago
Data Dependent Power Use in Multipliers
Recent research has demonstrated the vulnerability of certain smart card architectures to power and electromagnetic analysis when multiplier operations are insufficiently shielde...
Colin D. Walter, David Samyde
IWANN
2005
Springer
15 years 3 months ago
Direct and Recursive Prediction of Time Series Using Mutual Information Selection
Abstract. This paper presents a comparison between direct and recursive prediction strategies. In order to perform the input selection, an approach based on mutual information is u...
Yongnan Ji, Jin Hao, Nima Reyhani, Amaury Lendasse
CAP
2010
14 years 5 months ago
Parallel sparse polynomial division using heaps
We present a parallel algorithm for exact division of sparse distributed polynomials on a multicore processor. This is a problem with significant data dependencies, so our solutio...
Michael B. Monagan, Roman Pearce