Sciweavers

2891 search results - page 71 / 579
» More or Less Elaborate
Sort
View
SACRYPT
2001
Springer
130views Cryptology» more  SACRYPT 2001»
15 years 3 months ago
On the Complexity of Matsui's Attack
Linear cryptanalysis remains the most powerful attack against DES at this time. Given 243 known plaintext-ciphertext pairs, Matsui expected a complexity of less than 243 DES evalua...
Pascal Junod
FCCM
2000
IEEE
105views VLSI» more  FCCM 2000»
15 years 3 months ago
A Communication Scheduling Algorithm for Multi-FPGA Systems
For multiple FPGA systems, the limited number of I/O pins causes many problems. To solve these problems, efficient communication scheduling among FPGAs is crucial for obtaining hi...
Jinwoo Suh, Dong-In Kang, Stephen P. Crago
ISMVL
1994
IEEE
87views Hardware» more  ISMVL 1994»
15 years 2 months ago
Multiple-Valued-Input TANT Networks
The paper proposes mvTANTs, three-level networks with multiple-valued inputs and binary outputs. These networks are a generalization of binary TANTs (Three level And Not networks...
Marek A. Perkowski, Malgorzata Chrzanowska-Jeske
DATE
2004
IEEE
103views Hardware» more  DATE 2004»
15 years 2 months ago
A Novel Implementation of Tile-Based Address Mapping
Tile-based data layout has been applied to achieve various objectives such as minimizing cache conflicts and memory row switching activity. In some applications of tilebased mappi...
Sambuddhi Hettiaratchi, Peter Y. K. Cheung
ERSHOV
2006
Springer
15 years 2 months ago
Chase of Recursive Queries
In this work, we present a semantic query optimization technique to improve the efficiency of the evaluation of a subset of SQL:1999 recursive queries. Using datalog notation, we c...
Nieves R. Brisaboa, Antonio Fariña, Miguel ...