Sciweavers

2658 search results - page 22 / 532
» Micro-communication Element System
Sort
View
87
Voted
JAL
1998
74views more  JAL 1998»
15 years 1 months ago
A Survey of Fast Exponentiation Methods
Public-key cryptographic systems often involve raising elements of some group (e.g. GF(2n), Z/NZ, or elliptic curves) to large powers. An important question is how fast this expon...
Daniel M. Gordon
DFT
2005
IEEE
72views VLSI» more  DFT 2005»
15 years 7 months ago
Soft Error Modeling and Protection for Sequential Elements
Sequential elements, flip-flops, latches, and memory cells, are the most vulnerable components to soft errors. Since state-of-the-art designs contain millions of bistables, it i...
Hossein Asadi, Mehdi Baradaran Tahoori
TCS
2008
15 years 1 months ago
Reversible computing and cellular automata - A survey
Reversible computing is a paradigm where computing models are so defined that they reflect physical reversibility, one of the fundamental microscopic physical property of Nature. ...
Kenichi Morita
90
Voted
SIGIR
2006
ACM
15 years 7 months ago
User expectations from XML element retrieval
The primary aim of XML element retrieval is to return to users XML elements, rather than whole documents. This poster describes a small study, in which we elicited users’ expect...
Stamatina Betsi, Mounia Lalmas, Anastasios Tombros...
JCDCG
2000
Springer
15 years 5 months ago
Structure Theorems for Systems of Segments
We study intersection properties of systems of segments in the plane. In particular, we show that there exists a constant c > 0 such that every system S of n straight-line segme...
János Pach, József Solymosi