Sciweavers

4000 search results - page 163 / 800
» Simulation down under
Sort
View
118
Voted
ASIACRYPT
2003
Springer
15 years 9 months ago
Leakage-Resilient Authenticated Key Establishment Protocols
Authenticated Key Establishment (AKE) protocols enable two entities, say a client (or a user) and a server, to share common session keys in an authentic way. In this paper, we revi...
SeongHan Shin, Kazukuni Kobara, Hideki Imai
CDC
2009
IEEE
127views Control Systems» more  CDC 2009»
15 years 8 months ago
Dirichlet problems for some Hamilton-Jacobi equations with inequality constraints
We use viability techniques for solving Dirichlet problems with inequality constraints (obstacles) for a class of Hamilton-Jacobi equations. The hypograph of the “solution” is ...
Jean-Pierre Aubin, Alexandre M. Bayen, Patrick Sai...
126
Voted
SUM
2009
Springer
15 years 8 months ago
Compression of Probabilistic XML Documents
Database techniques to store, query and manipulate data that contains uncertainty receives increasing research interest. Such UDBMSs can be classified according to their underlyin...
Irma Veldman, Ander de Keijzer, Maurice van Keulen
121
Voted
CAV
2001
Springer
83views Hardware» more  CAV 2001»
15 years 8 months ago
Iterating Transducers
Regular languages have proved useful for the symbolic state exploration of infinite state systems. They can be used to represent infinite sets of system configurations; the tran...
Dennis Dams, Yassine Lakhnech, Martin Steffen
134
Voted
DAC
1999
ACM
15 years 8 months ago
Synthesis of Low Power CMOS VLSI Circuits Using Dual Supply Voltages
Dynamic power consumed in CMOS gates goes down quadratically with the supply voltage. By maintaining a high supply voltage for gates on the critical path and by using a low supply...
Vijay Sundararajan, Keshab K. Parhi