Sciweavers

2119 search results - page 105 / 424
» Structure-Preserving Model Reduction
Sort
View
IPTPS
2004
Springer
15 years 8 months ago
On the Cost of Participating in a Peer-to-Peer Network
In this paper, we model the cost incurred by each peer participating in a peer-to-peer network. Such a cost model allows to gauge potential disincentives for peers to collaborate,...
Nicolas Christin, John Chuang
GLVLSI
2000
IEEE
110views VLSI» more  GLVLSI 2000»
15 years 7 months ago
A sensitivity based placer for standard cells
We present a new timing driven method for global placement. Our method is based on the observation that similar net length reductions in the different nets that make up a path may...
Bill Halpin, C. Y. Roger Chen, Naresh Sehgal
CRYPTO
2000
Springer
139views Cryptology» more  CRYPTO 2000»
15 years 7 months ago
On the Exact Security of Full Domain Hash
Abstract. The Full Domain Hash (FDH) scheme is a RSA-based signature scheme in which the message is hashed onto the full domain of the RSA function. The FDH scheme is provably secu...
Jean-Sébastien Coron
CDC
2009
IEEE
124views Control Systems» more  CDC 2009»
15 years 6 months ago
3D bipedal walking with knees and feet: A hybrid geometric approach
Abstract— Motivated by the goal of obtaining moreanthropomorphic walking in bipedal robots, this paper considers a hybrid model of a 3D hipped biped with feet and locking knees. ...
Ryan W. Sinnet, Aaron D. Ames
FMSD
2002
128views more  FMSD 2002»
15 years 2 months ago
Combining Software and Hardware Verification Techniques
Combining verification methods developed separately for software and hardware is motivated by the industry's need for a technology that would make formal verification of reali...
Robert P. Kurshan, Vladimir Levin, Marius Minea, D...