Sciweavers

99 search results - page 5 / 10
» Properties of the Realization of Inner Functions
Sort
View
108 views 121 votes 16 years 1 months ago  STOC 2006»
Gowers [Gow98, Gow01] introduced, for d 1, the notion of dimension-d uniformity Ud (f) of a function f : G C, where G is a finite abelian group. Roughly speaking, if a function ...
117 views 92 votes 15 years 10 months ago  ICCAD 2008»
— In an incompletely specified function f, don’t care values can be chosen to minimize the number of variables to represent f. It is shown that, in incompletely specified fun...
160 views 112 votes 15 years 3 months ago  ASPDAC 2008»
Abstract--Resonant tunneling diodes (RTDs) have demonstrated promising circuit characteristics of high speed switching property and versatile functionality with negative differenti...
142 views 94 votes 15 years 8 months ago  ETFA 2008»
Industrial and building automation systems are more and more important in industry and buildings. New services and novel fields of application call for dependable systems. Two ver...
123 views 123 votes 15 years 5 months ago  EUROCRYPT 2007»
Abstract. We introduce a notion of instance-dependent verifiable random functions (InstD-VRFs for short). Informally, an InstD-VRF is, in some sense, a verifiable random function [...
84 views 103 votes 15 years 1 months ago  MCSS 2007»
We consider the symmetric Darlington synthesis of a p × p rational symmetric Schur function S with the constraint that the extension is of size 2p×2p. Under the assumption that S...
138 views 88 votes 15 years 1 months ago  AMC 2005»
We present an interval branch-and-prune algorithm for computing verified enclosures for the global minimum and all global minimizers of univariate functions subject to bound const...
151 views 89 votes 15 years 2 months ago  ACL 2003»
We introduce a MetaGrammar, which allows us to automatically generate, from a single and compact MetaGrammar hierarchy, parallel Lexical Functional Grammars (LFG) and Tree-Adjoini...
131 views 131 votes 15 years 1 months ago  JMLR 2006»
Kernels are two-placed functions that can be interpreted as inner products in some Hilbert space. It is this property which makes kernels predestinated to carry linear models of l...
137 views 106 votes 15 years 8 months ago  ASIACRYPT 2009»
The design of cryptographic hash functions is a very complex and failure-prone process. For this reason, this paper puts forward a completely modular and fault-tolerant approach to...