Sciweavers

3022 search results - page 104 / 605
» Make Way for WayMaker
Sort
View
FSE
2001
Springer
190views Cryptology» more  FSE 2001»
15 years 5 months ago
ZIP Attacks with Reduced Known Plaintext
Abstract. Biham and Kocher demonstrated that the PKZIP stream cipher was weak and presented an attack requiring thirteen bytes of plaintext. The deflate algorithm “zippers” no...
Michael Stay
VLDB
2001
ACM
113views Database» more  VLDB 2001»
15 years 5 months ago
Querying XML Views of Relational Data
XML has emerged as the standard data exchange format for Internet-based business applications. This has created the need to publish existing business data, stored in relational da...
Jayavel Shanmugasundaram, Jerry Kiernan, Eugene J....
EUROMICRO
2000
IEEE
15 years 5 months ago
Behavior-Preserving Transformations for Design-for-Test
An important aspect in the design of hardware/software systems is design-for-test. Improving the testability of a hardware/software system typically implies improving the controll...
Jeroen Voeten, Harald P. E. Vranken
GLVLSI
2000
IEEE
110views VLSI» more  GLVLSI 2000»
15 years 5 months ago
A sensitivity based placer for standard cells
We present a new timing driven method for global placement. Our method is based on the observation that similar net length reductions in the different nets that make up a path may...
Bill Halpin, C. Y. Roger Chen, Naresh Sehgal
119
Voted
GLVLSI
2000
IEEE
87views VLSI» more  GLVLSI 2000»
15 years 5 months ago
Speeding up symbolic model checking by accelerating dynamic variable reordering
Symbolic Model checking is a widely used technique in sequential verification. As the size of the OBDDs and also the computation time depends on the order of the input variables,...
Christoph Meinel, Christian Stangier