Sciweavers

3913 search results - page 218 / 783
» complexity 2006
Sort
View
INFORMATICALT
2006
134views more  INFORMATICALT 2006»
15 years 4 months ago
Fast Parallel Exponentiation Algorithm for RSA Public-Key Cryptosystem
We know the necessity for information security becomes more widespread in these days, especially for hardware-based implementations such as smart cards chips for wireless applicati...
Chia-Long Wu, Der-Chyuan Lou, Jui-Chang Lai, Te-Je...
FMSD
2002
107views more  FMSD 2002»
15 years 4 months ago
Verification of Out-Of-Order Processor Designs Using Model Checking and a Light-Weight Completion Function
We present a new technique for verification of complex hardware devices that allows both generality andahighdegreeofautomation.Thetechniqueisbasedonournewwayofconstructinga"li...
Sergey Berezin, Edmund M. Clarke, Armin Biere, Yun...
KBS
2006
117views more  KBS 2006»
15 years 4 months ago
Risk and confidence analysis for fuzzy multicriteria decision making
Recent research has recognised that multicriteria decision making (MCDM) should take account of uncertainty, risk and confidence. This paper takes this research forward by using l...
Norman E. Fenton, Wei Wang
STOC
2006
ACM
166views Algorithms» more  STOC 2006»
16 years 4 months ago
New upper and lower bounds for randomized and quantum local search
Local Search problem, which finds a local minimum of a black-box function on a given graph, is of both practical and theoretical importance to combinatorial optimization, complexi...
Shengyu Zhang
ICCAD
2006
IEEE
130views Hardware» more  ICCAD 2006»
16 years 1 months ago
On bounding the delay of a critical path
Process variations cause different behavior of timingdependent effects across different chips. In this work, we analyze one example of timing-dependent effects, crosscoupling ...
Leonard Lee, Li-C. Wang