نتایج جستجو برای: boolean filter
تعداد نتایج: 146487 فیلتر نتایج به سال:
We prove that for every singular cardinal μ of cofinality ω, the complete Boolean algebra compPμ(μ) contains a complete subalgebra which is isomorphic to the collapse algebra CompCol(ω1, μ0 ). Consequently, adding a generic filter to the quotient algebra Pμ(μ) = P(μ)/[μ] collapses μ0 to א1. Another corollary is that the Baire number of the space U(μ) of all uniform ultrafilters over μ is equal ...
The four direrent types of stack filters, type-0 through type-3, are determined by four dfferent shapes of the on-set of the positive Boolean function from which the stack filter is constructed. Under all three appending strategies commonly considered in the literature --first and last value carry on strategy, constant value carry on strategy, and the circular approach -stack filters of type-0 ...
In this paper, we present Decim, a stream cipher hardwareoriented selected for the phase 3 of the ECRYPT stream cipher project eSTREAM. As required by the initial call for hardware-oriented stream cipher contribution, Decim manages 80-bit secret keys and 64-bit public initialization vectors. The design of Decim combines two filtering mechanisms: a nonlinear Boolean filter over a LFSR, followed ...
One can check that there exists a lattice which is non trivial, Boolean, and strict. Let X be a set. Observe that there exists a family of subsets of X which is finite and non empty. Let S be a 1-sorted structure. One can check that there exists a family of subsets of S which is finite and non empty. Let L be a non trivial upper-bounded non empty poset. Note that there exists a filter of L whic...
In this paper, we present Decim, a stream cipher hardwareoriented selected for the phase 3 of the ECRYPT stream cipher project eSTREAM. As required by the initial call for hardware-oriented stream cipher contribution, Decim manages 80-bit secret keys and 64-bit public initialization vectors. The design of Decim combines two filtering mechanisms: a nonlinear Boolean filter over a LFSR, followed ...
Consideration of pairs of transition in probabilistic simulation allows power estimation for digital circuits in which inertial delays can filter glitches [5]. However, the merit of the method is not fully realized because of the way probabilistic simulation approximates spatial correlations of signals in the presence of delays. In this paper, we use supergate partitions (enclosing reconvergent...
Contract-based design is an expressive paradigm for a modular and compositional specification of programs. It is in turn becoming a fundamental concept in mainstream industrial computer-aided design tools for embedded system design. In this paper, we elaborate new foundations for contract-based embedded system design by proposing a general-purpose algebra of assume/guarantee contracts based on ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید