Sciweavers

3898 search results - page 342 / 780
» On the Bit Extraction Problem
Sort
View
118
Voted
MMMACNS
2001
Springer
15 years 8 months ago
Generalized Oblivious Transfer Protocols Based on Noisy Channels
The main cryptographic primitives (Bit Commitment (BC) and Oblivious Transfer (OT) protocols) based on noisy channels have been considered in [1] for asymptotic case. Non-asymptoti...
Valeri Korjik, Kirill Morozov
NOSSDAV
2001
Springer
15 years 8 months ago
Video over TCP with receiver-based delay control
Unicasting video streams over TCP connections is a challenging problem because video sources cannot normally adapt to delay and throughput variations of TCP connections. This pape...
Pai-Hsiang Hsiao, H. T. Kung, Koan-Sin Tan
ATS
2000
IEEE
98views Hardware» more  ATS 2000»
15 years 8 months ago
Embedded core testing using genetic algorithms
Testing of embedded cores is very difficult in SOC (system-on-a-chip), since the core user may not know the gate level implementation of the core, and the controllability and obse...
Ruofan Xu, Michael S. Hsiao
ISCAS
1999
IEEE
106views Hardware» more  ISCAS 1999»
15 years 8 months ago
Test pattern generation for width compression in BIST
The main objectives of Built-In Self Test (BIST) are the design of test pattern generator circuits which achieve the highest fault coverage, require the shortest sequence of test ...
Paulo F. Flores, Horácio C. Neto, K. Chakra...
139
Voted
COMPGEOM
1997
ACM
15 years 8 months ago
Robust Proximity Queries: An Illustration of Degree-Driven Algorithm Design
Abstract. In the context of methodologies intended to confer robustness to geometric algorithms, we elaborate on the exact-computation paradigm and formalize the notion of degree o...
Giuseppe Liotta, Franco P. Preparata, Roberto Tama...