• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 1,901
Next 10 →

Randomized Gossip Algorithms

by Stephen Boyd, Arpita Ghosh, Balaji Prabhakar, Devavrat Shah - IEEE TRANSACTIONS ON INFORMATION THEORY , 2006
"... Motivated by applications to sensor, peer-to-peer, and ad hoc networks, we study distributed algorithms, also known as gossip algorithms, for exchanging information and for computing in an arbitrarily connected network of nodes. The topology of such networks changes continuously as new nodes join a ..."
Abstract - Cited by 532 (5 self) - Add to MetaCart
and scaling of gossip algorithms on two popular networks: Wireless Sensor Networks, which are modeled as Geometric Random Graphs, and the Internet graph under the so-called Preferential Connectivity (PC) model.

Abstract Deterministic Logic BIST for Transition Fault Testing 1

by Valentin Gherman, Hans-joachim Wunderlich
"... BIST is an attractive approach to detect delay faults due to its inherent support for at-speed test. Deterministic logic BIST (DLBIST) is a technique which was successfully applied to stuck-at fault testing. As delay faults have lower random pattern testability than stuck-at faults, the need for DLB ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
consider the so-called transition fault model, which is widely used for complexity reasons. We present an extension of a DLBIST scheme for transition fault testing. Functional justification has been used to generate the required pattern pairs. The efficiency of the extended scheme is investigated using

Differential Fault Analysis of Secret Key Cryptosystems

by Eli Biham, Adi Shamir , 1997
"... In September 1996 Boneh, Demillo, and Lipton from Bellcore announced a new type of cryptanalytic attack which exploits computational errors to find cryptographic keys. Their attack is based on algebraic properties of modular arithmetic, and thus it is applicable only to public key cryptosystems suc ..."
Abstract - Cited by 315 (3 self) - Add to MetaCart
such as RSA, and not to secret key algorithms such as the Data Encryption Standard (DES). In this paper, we describe a related attack, which we call Differential Fault Analysis, or DFA, and show that it is applicable to almost any secret key cryptosystem proposed so far in the open literature. Our DFA attack

A generalized hidden markov model for the recognition of human genes

by David Kulp, David Haussler, Martin G. Reese, Frank H. Eeckman - in DNA. In: Proc. Int. Conf. Intell , 1996
"... We present a statistical model of genes in DNA. A Generalized Hidden Markov Model (GtlMM) provides the framework for describing the grasnmar of a legal parse of a DNA sequence (Stormo & Haussler 1994). Probabilities are assigned to transitions between states in tile GItMM and to the generation o ..."
Abstract - Cited by 182 (15 self) - Add to MetaCart
We present a statistical model of genes in DNA. A Generalized Hidden Markov Model (GtlMM) provides the framework for describing the grasnmar of a legal parse of a DNA sequence (Stormo & Haussler 1994). Probabilities are assigned to transitions between states in tile GItMM and to the generation

The polyadic π-calculus: a tutorial

by Robin Milner - LOGIC AND ALGEBRA OF SPECIFICATION , 1991
"... The π-calculus is a model of concurrent computation based upon the notion of naming. It is first presented in its simplest and original form, with the help of several illustrative applications. Then it is generalized from monadic to polyadic form. Semantics is done in terms of both a reduction syste ..."
Abstract - Cited by 187 (1 self) - Add to MetaCart
system and a version of labelled transitions called commitment; the known algebraic axiomatization of strong bisimilarity isgiven in the new setting, and so also is a characterization in modal logic. Some theorems about the replication operator are proved. Justification for the polyadic form is provided

Self-determination and persistence in a real-life setting: Toward a motivational model of high school dropout.

by Robert J Vallerand , Michelle S Fbrtier , Frederic Guay - Journal of Personality and Social Psychology, , 1997
"... The purpose of this study was to propose and test a motivational model of high school dropout. The model posits that teachers, parents, and the school administration's behaviors toward students influence students' perceptions of competence and autonomy. The less autonomy supportive the so ..."
Abstract - Cited by 183 (19 self) - Add to MetaCart
) that these gender differences in motivation seem to engender, research on the determinants of these motivation differences is definitely called for. We feel that the motivational model includes important determinants of these gender differences. For instance, the social context at school may be responsible to some

Fault

by Dominik Sojer, Christian Buckl, Alois Knoll, Dominik Sojer, Alois Knoll, Christian Buckl
"... Abstract Safety requirements are an important arti-fact in the development of safety critical systems. They are used by experts as a basis for appropriate selec-tion and implementation of fault detection mechanisms. Various research groups have worked on their formal modeling with the goal of determ ..."
Abstract - Add to MetaCart
Abstract Safety requirements are an important arti-fact in the development of safety critical systems. They are used by experts as a basis for appropriate selec-tion and implementation of fault detection mechanisms. Various research groups have worked on their formal modeling with the goal

HIGH QUALITY TRANSITION AND SMALL DELAY FAULT ATPG

by Puneet Gupta , 2004
"... Path selection and generating tests for small delay faults is an important issue in the delay fault area. A novel technique for generating effective vectors for delay defects is the first issue that we have presented in the thesis. The test set achieves high path delay fault coverage to capture smal ..."
Abstract - Add to MetaCart
small-distributed delay defects and high transition fault coverage to capture gross delay defects. Furthermore, non-robust paths for ATPG are filtered (selected) carefully so that there is a minimum overlap with the already tested robust paths. A relationship between path delay fault model

L.Q.: Affective Video Content Representation and Modeling

by Alan Hanjalic, Li-qun Xu - IEEE Transactions on Multimedia , 2005
"... Abstract—This paper looks into a new direction in video content analysis – the representation and modeling of affective video con-tent. The affective content of a given video clip can be defined as the intensity and type of feeling or emotion (both are referred to as affect) that are expected to ari ..."
Abstract - Cited by 127 (3 self) - Add to MetaCart
and valence dimensions to low-level features extracted from video data. This results in the arousal and valence time curves that, either considered separately or combined into the so-called affect curve, are introduced as reliable represen-tations of expected transitions from one feeling to another along a

The Transition Fault Model of Programmable Logic

by Sistemų Inžinerija, Kompiuterinės Technologijos, V. Abraitis, Ž. Tamoševičius
"... Recently the need for specialized devices is going greater and greater. But need for such devices in the mar-ket are in small quantities. To manufacture something in small quantities mostly in all cases is unprofitable. This ..."
Abstract - Add to MetaCart
Recently the need for specialized devices is going greater and greater. But need for such devices in the mar-ket are in small quantities. To manufacture something in small quantities mostly in all cases is unprofitable. This
Next 10 →
Results 1 - 10 of 1,901
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University