Sciweavers

1542 search results - page 159 / 309
» The Observational Power of Clocks
Sort
View
FOSSACS
2004
Springer
15 years 6 months ago
Probabilistic Bisimulation and Equivalence for Security Analysis of Network Protocols
Abstract. Using a probabilistic polynomial-time process calculus designed for specifying security properties as observational equivalences, we develop a form of bisimulation that j...
Ajith Ramanathan, John C. Mitchell, Andre Scedrov,...
105
Voted
CCECE
2009
IEEE
15 years 5 months ago
Capacity analysis of a decode-and-forward cooperative network under adaptive transmission
—This paper presents a capacity analysis of a decode-and-forward (DF) cooperative network with adaptive source transmission. Three different adaptive techniques are considered: (...
Prasanna Kalansuriya, Chintha Tellambura
102
Voted
IJCNN
2000
IEEE
15 years 5 months ago
A Constraint Learning Algorithm for Blind Source Separation
In Jutten’s blind separation algorithm, symmetrical distribution and statistical independence of the signal sources are assumed. When they are not satisfied, the learning proce...
Kenji Nakayama, Akihiro Hirano, Motoki Nitta
ISCAS
1994
IEEE
63views Hardware» more  ISCAS 1994»
15 years 5 months ago
On the Synchronization of Oscillators Coupled by One Negative Resistor
There have been many investigations of the mutual synchronization of oscillators. In this study we consider N oscillators which have the same natural frequency, mutually coupled b...
Hiroyuki Kanasugi, Seiichiro Moro, Yoshifumi Nishi...
107
Voted
CODES
2001
IEEE
15 years 4 months ago
Evaluating register file size in ASIP design
Interest in synthesis of Application Specific Instruction Set Processors or ASIPs has increased considerably and a number of methodologies have been proposed for ASIP design. A ke...
Manoj Kumar Jain, Lars Wehmeyer, Stefan Steinke, P...