Sciweavers

5525 search results - page 1005 / 1105
» Verification of Model Transformations
Sort
View
ICCAD
2000
IEEE
132views Hardware» more  ICCAD 2000»
15 years 5 months ago
Frequency Domain Analysis of Switching Noise on Power Supply Network
In this paper, we propose an approach for the analysis of power supply noise in the frequency domain for power/ground (P/G) networks of tree topologies. We model the P/G network a...
Shiyou Zhao, Kaushik Roy, Cheng-Kok Koh
81
Voted
ICPR
2000
IEEE
15 years 5 months ago
Incremental Multiview Integration of Range Images
This paper presents a new method for the incremental integration of overlapped range images. It is assumed thatframe transformations between all pairs of views can be reliably com...
Angel Domingo Sappa, Miguel Angel García
IPPS
2000
IEEE
15 years 5 months ago
Dynamic Data Layouts for Cache-Conscious Factorization of DFT
Effective utilization of cache memories is a key factor in achieving high performance in computing the Discrete Fourier Transform (DFT). Most optimizationtechniques for computing ...
Neungsoo Park, Dongsoo Kang, Kiran Bondalapati, Vi...
94
Voted
SIGMETRICS
2000
ACM
15 years 5 months ago
TCP in presence of bursty losses
In this paper we analyze the performance of a TCP-like flow control in a lossy environment. The transmission rate in the control scheme that we consider has a linear growth rate;...
Eitan Altman, Konstantin Avrachenkov, Chadi Baraka...
CRYPTO
2000
Springer
128views Cryptology» more  CRYPTO 2000»
15 years 5 months ago
The Security of All-or-Nothing Encryption: Protecting against Exhaustive Key Search
We investigate the all-or-nothing encryption paradigm which was introduced by Rivest as a new mode of operation for block ciphers. The paradigm involves composing an all-or-nothing...
Anand Desai
« Prev « First page 1005 / 1105 Last » Next »