Sciweavers

2658 search results - page 22 / 532
» Micro-communication Element System
Sort
View
JAL
1998
74views more  JAL 1998»
14 years 11 months ago
A Survey of Fast Exponentiation Methods
Public-key cryptographic systems often involve raising elements of some group (e.g. GF(2n), Z/NZ, or elliptic curves) to large powers. An important question is how fast this expon...
Daniel M. Gordon
DFT
2005
IEEE
72views VLSI» more  DFT 2005»
15 years 5 months ago
Soft Error Modeling and Protection for Sequential Elements
Sequential elements, flip-flops, latches, and memory cells, are the most vulnerable components to soft errors. Since state-of-the-art designs contain millions of bistables, it i...
Hossein Asadi, Mehdi Baradaran Tahoori
TCS
2008
14 years 11 months ago
Reversible computing and cellular automata - A survey
Reversible computing is a paradigm where computing models are so defined that they reflect physical reversibility, one of the fundamental microscopic physical property of Nature. ...
Kenichi Morita
SIGIR
2006
ACM
15 years 5 months ago
User expectations from XML element retrieval
The primary aim of XML element retrieval is to return to users XML elements, rather than whole documents. This poster describes a small study, in which we elicited users’ expect...
Stamatina Betsi, Mounia Lalmas, Anastasios Tombros...
JCDCG
2000
Springer
15 years 3 months ago
Structure Theorems for Systems of Segments
We study intersection properties of systems of segments in the plane. In particular, we show that there exists a constant c > 0 such that every system S of n straight-line segme...
János Pach, József Solymosi