Sciweavers

6274 search results - page 923 / 1255
» Proofs, Programs, Processes
Sort
View
116
Voted
FSE
1993
Springer
101views Cryptology» more  FSE 1993»
15 years 7 months ago
SAFER K-64: A Byte-Oriented Block-Ciphering Algorithm
: A new non-proprietary secret-key block-enciphering algorithm, SAFER K-64 (for Secure And Fast Encryption Routine with a Key of length 64 bits) is described. The blocklength is 64...
James L. Massey
EDCC
1994
Springer
15 years 7 months ago
Hierarchical Checking of Multiprocessors Using Watchdog Processors
A new control flow checking scheme, based on assigned-signature checking by a watchdog processor, is presented. This scheme is suitable for a multitasking, multiprocessor environme...
István Majzik, András Pataricza, Mar...
CEC
2007
IEEE
15 years 7 months ago
Evolution of classification rules for comprehensible knowledge discovery
This article, which lies within the data mining framework, proposes a method to build classifiers based on the evolution of rules. The method, named REC (Rule Evolution for Classif...
Emiliano Carreno, Guillermo Leguizamón, Nea...
DOCENG
2007
ACM
15 years 7 months ago
Declarative extensions of XML languages
We present a set of XML language extensions that bring notions from functional programming to web authors, extending the power of declarative modelling for the web. Our previous w...
Simon J. Thompson, Peter R. King, Patrick Schmitz
153
Voted
VLSID
2010
IEEE
211views VLSI» more  VLSID 2010»
15 years 7 months ago
A Combined DOE-ILP Based Power and Read Stability Optimization in Nano-CMOS SRAM
A novel design approach for simultaneous power and stability (static noise margin, SNM) optimization of nanoCMOS static random access memory (SRAM) is presented. A 45nm single-end...
Garima Thakral, Saraju P. Mohanty, Dhruva Ghai, Dh...