Sciweavers

1953 search results - page 102 / 391
» codes 2010
Sort
View
TOMS
2010
89views more  TOMS 2010»
15 years 2 months ago
DOLFIN: Automated finite element computing
s the mathematical abstractions and methods used in the design of the library and its implementation. A number of examples are presented to demonstrate the use of the library in ap...
Anders Logg, Garth N. Wells
CAV
2010
Springer
161views Hardware» more  CAV 2010»
15 years 8 months ago
Directed Proof Generation for Machine Code
We present the algorithms used in MCVETO (Machine-Code VErification TOol), a tool to check whether a stripped machinecode program satisfies a safety property. The verification p...
Aditya V. Thakur, Junghee Lim, Akash Lal, Amanda B...
CORR
2010
Springer
65views Education» more  CORR 2010»
15 years 4 months ago
Iterative method for improvement of coding and decryption
Cryptographic check values (digital signatures, MACs and H-MACs) are useful only if they are free of errors. For that reason all of errors in cryptographic check values should be ...
Natasa Zivic
VTC
2010
IEEE
113views Communications» more  VTC 2010»
15 years 2 months ago
Design of Fixed-Point Processing Based Turbo Codes Using Extrinsic Information Transfer Charts
—The operand-width specifications in fixed-point hardware implementations of turbo code decoders is an important design issue, since this governs the trade-off between the deco...
Liang Li, Robert G. Maunder, Bashir M. Al-Hashimi,...
CORR
2010
Springer
108views Education» more  CORR 2010»
15 years 4 months ago
On Graphs and Codes Preserved by Edge Local Complementation
Orbits of graphs under local complementation (LC) and edge local complementation (ELC) have been studied in several different contexts. For instance, there are connections between...
Lars Eirik Danielsen, Matthew G. Parker, Constanza...