In this paper we investigate the statistics of multiplier operands and identify two characteristics of their distribution that have important consequences for the design of low po...
We give an algorithm that computes the final state of certain growth models without computing all intermediate states. Our technique is based on a "least action principle"...
Efficient and competitive provision of service compositions depends both on the composition structure, and on planning and management of computational resources necessary for prov...
Dragan Ivanovic, Martin Treiber, Manuel Carro, Sch...
This paper presents a Path Swapping (PS) method which enables to enhance the security of Quasi Delay Insensitive Asynchronous Circuits against Power Analysis (PA) attack. This appr...
—We study information diffusion in real-life and synthetic dynamic networks, using well known threshold and cascade models of diffusion. Our test-bed is the communication network...
Konstantin Mertsalov, Malik Magdon-Ismail, Mark K....