Sciweavers

683 search results - page 64 / 137
» Vulnerability Analysis of High Dimensional Complex Systems
Sort
View
FOCM
2002
140views more  FOCM 2002»
15 years 12 days ago
Adaptive Wavelet Methods II - Beyond the Elliptic Case
This paper is concerned with the design and analysis of adaptive wavelet methods for systems of operator equations. Its main accomplishment is to extend the range of applicability...
Albert Cohen, Wolfgang Dahmen, Ronald A. DeVore
162
Voted
CODES
2008
IEEE
15 years 2 months ago
Application specific non-volatile primary memory for embedded systems
Memory subsystems have been considered as one of the most critical components in embedded systems and furthermore, displaying increasing complexity as application requirements div...
Kwangyoon Lee, Alex Orailoglu
103
Voted
CORR
2010
Springer
179views Education» more  CORR 2010»
14 years 10 months ago
The DMM bound: multivariate (aggregate) separation bounds
In this paper we derive aggregate separation bounds, named after Davenport-MahlerMignotte (DMM), on the isolated roots of polynomial systems, specifically on the minimum distance ...
Ioannis Z. Emiris, Bernard Mourrain, Elias P. Tsig...
75
Voted
IJBC
2008
87views more  IJBC 2008»
15 years 19 days ago
Digital Secure-Communication Using Robust Hyper-Chaotic Systems
Abstract-- In this paper, we propose a robust hyperchaotic system that is practically serviceable in digital securecommunication. The system consists of many coupled robust logisti...
Shih-Liang Chen, Shu-Ming Chang, Wen-Wei Lin, Ting...
84
Voted
SODA
2008
ACM
108views Algorithms» more  SODA 2008»
15 years 2 months ago
Dimension augmentation and combinatorial criteria for efficient error-resistant DNA self-assembly
DNA self-assembly has emerged as a rich and promising primitive for nano-technology. Experimental and analytical evidence indicates that such systems are prone to errors, and acco...
Ho-Lin Chen, Ashish Goel, Chris Luhrs