Filters








12 Hits in 7.0 sec

Measuring logic complexity can guide pattern discovery in empirical systems [article]

Marco Gherardi, Pietro Rotondo
2016 arXiv   pre-print
The asymmetry between "on" and "off" states in the data correlates with the complexity in a non-null way; a model of random Boolean networks clarifies this trend and indicates a common hierarchical architecture  ...  , used in the study of genetic regulation, to a more general and detailed measure; (iii) it is tightly linked to the resilience of a function's output to noise affecting its inputs.  ...  Acknowledgements We are thankful to Marco Cosentino Lagomarsino for discussions and useful comments on a previous version of the manuscript.  ... 
arXiv:1603.03337v1 fatcat:xa7f6k6p7rgglmx47a47cytxsu

On the mathematical structure of quantum models of computation based on Hamiltonian minimisation [article]

Jacob Biamonte
2021 arXiv   pre-print
Ising interaction terms can be mimicked through the minimisation of 2- and 1-body Ising terms yet require the introduction of slack spins; (ii) Perturbation theory gadgets enable the emulation of interactions  ...  Other related results are also presented as they relate to ground state quantum computation and the minimisation of Hamiltonians by quantum circuits.  ...  (6.25) Then ( 1 , · · · , ) becomes a sum of 3-variable XOR terms up to −3 constraints. Each of the 3-variable XORs can then be reduced to 2-body using gadget described above. Example 37.  ... 
arXiv:2009.10088v2 fatcat:a4qx6bakebga7ar5lpmonsea2u

The QARMA Block Cipher Family. Almost MDS Matrices Over Rings With Zero Divisors, Nearly Symmetric Even-Mansour Constructions With Non-Involutory Central Rounds, and Search Heuristics for Low-Latency S-Boxes

Roberto Avanzi
2017 IACR Transactions on Symmetric Cryptology  
The purpose of all these design choices is to harden the cipher against various classes of attacks. We also describe new S-Box search heuristics aimed at minimising the critical path.  ...  Finally, we propose a technique to extend the length of the tweak by using, for instance, a universal hash function, which can also be used to strengthen the security of QARMA.  ...  We express gratitude to the authors of [BJK + 16] for the fruitful interaction, in particular to Christof Beierle for sharing his MILP modelling of the Class I state transitions used in § 3.1.2.  ... 
doi:10.13154/tosc.v2017.i1.4-44 dblp:journals/tosc/Avanzi17 fatcat:l5zgiqa3lzedpdajqqomixpabe

The QARMA Block Cipher Family. Almost MDS Matrices Over Rings With Zero Divisors, Nearly Symmetric Even-Mansour Constructions With Non-Involutory Central Rounds, and Search Heuristics for Low-Latency S-Boxes

Roberto Avanzi
2017 IACR Transactions on Symmetric Cryptology  
The purpose of all these design choices is to harden the cipher against various classes of attacks. We also describe new S-Box search heuristics aimed at minimising the critical path.  ...  Finally, we propose a technique to extend the length of the tweak by using, for instance, a universal hash function, which can also be used to strengthen the security of QARMA.  ...  We express gratitude to the authors of [BJK + 16] for the fruitful interaction, in particular to Christof Beierle for sharing his MILP modelling of the Class I state transitions used in § 3.1.2.  ... 
doi:10.46586/tosc.v2017.i1.4-44 fatcat:iaiczp4lhzh5pgz4quzhjcj3jm

Identifying and Exploiting Structures for Reliable Deep Learning [article]

Amartya Sanyal
2021 arXiv   pre-print
To do this, we identify structures in deep neural networks that can be exploited to mitigate the above causes of unreliability of deep learning algorithms.  ...  The extraordinary performance of these systems often gives the impression that they can be used to revolutionise our lives for the better.  ...  C: We define the concept class C n of concepts c S : [0, 2 n ] if ( [x] b XOR S) is odd.  ... 
arXiv:2108.07083v1 fatcat:lducrn5tlfeqvpxevz6gukfvse

High efficiency video coding processor with Residue Number System

Niras Cheeckottu Vayalil
2022
The recent demand for high density video, such as ultra high definition (UHD) as well as its distribution over wired and wireless networks, led to the proposal of the latest video encoding standard, high  ...  Another important aspect of real-time video compression, including motion estimation, is the delay of the arithmetic computations.  ...  ., AND, OR, NAND, NOR) counts as one gate (for area and delay) and an XOR gate as two gates (area and delay).  ... 
doi:10.25949/19427168.v1 fatcat:fnvoqf2fqrep3gz4e54hhzgkkm

Verification of interconnects [article]

SJC Sebastiaan Joosten, MCJD Marko Van Eekelen, JF Jan Friso Groote, J Julien Schmaltz
2016
equations would be in the 'Arithmetic sum-of-product format' considered by Minato [Minato and Somenzi, 1997] .  ...  This sum is obtained by rewriting Boolean expressions about the transfer of packets into linear expressions.  ...  Apparently, reg is the name of the instantiation used inside the module reg_module_no_reset. The value of leftToRt is fully expressed using three nor gates.  ... 
doi:10.6100/ir838469 fatcat:mspecr7krndopcifypx2tdaw2e

Aalborg Universitet Lightweight Cryptography for Passive RFID Tags Lightweight Cryptography for Passive RFID Tags

David, Mathieu David, Moderator Assoc, Kiel Jensen, Mathieu David, Niels Vej, Aalborg Denmark
2011 unpublished
This metric also has the advantage of being customizable, depending on the requirement of an integrator for a particular application.  ...  Additionally, the privacy aspect involved with this technology could become a major issue in the perspective of a global adoption.  ...  In order to maximise the number of equations of S that are satisfied we minimise over the sum of the slack variables.  ... 
fatcat:lrxrgztwvvc7fkwl5efhykdl5a

Redundant Number Systems for Optimising Digital Signal Processing Performance in Field Programmable Gate Array [article]

William Hermanus Michael Kamp, University Of Canterbury
2012
Typically, the average number of non-zero symbols is less than a third and the worst case is less than a half.  ...  Utilising redundant representations at the output of an adder permits addition to be performed without carry-propagation, yielding fast, constant time performance irrespective of the word length.  ...  It is difficult to define and implement the Boolean operations of NOT, AND, OR, and XOR such that they give an equivalent result to binary.  ... 
doi:10.26021/2754 fatcat:2pafyywjbrfl5nrhgfnrgbskse

Transputer multi-processing and other topics in machine vision [article]

R. G. Browne, University Of Canterbury
2012
The provision of large processing power is achieved through the use of networks containing large numbers of micro-processors.  ...  The network topology is a significant factor in the system performance, and a particular network, the degree four chordal ring network, is proposed as a suitable network for transputer-based systems.  ...  PROCs to read from the stream (See Page 267) PROCs to ~ite to the stream (See Page 267) PROCs to call the user filer (See Page 267) PROCs to read from the stream PROC  ... 
doi:10.26021/3406 fatcat:ttqkuemvdfb7bg7ddtoqpp3iyq

Power Optimization of an Iterative Multiuser Detector for Turbo CodedCDMA

P Seema, H N Mishra, Prof Pratihari, M Swati, Patil, P Seema, H N Mishra, Prof Pratihari, M Swati, Patil
2013 International Journal of Emerging Trends in Electrical and Electronics (IJETEE)   unpublished
We propose dynamic decoding schedule optimization to fix the problem, that is, on each iteration of the receiver derive the optimal schedule to achieve a target bit error rate using a minimum number of  ...  We investigate two methods to obtain the optimal power levels: the first minimizes the total power; the second minimizes the area between the transfer curves of the interference canceller (IC) or turbo  ...  Instead, modulo-2 division is used, where the remainder is derived from an exclusive OR (XOR) operation.  ... 
fatcat:kiwm23tgwzgndmbedjkay7h4w4

High integrity hardware-software codesign

Adrian J. Hilton
2004
This process incorporates the use of Synchronous Receptive Process Theory as a semantic basis for specifying and proving properties of programs executing on PLDs, and extends the use of SPARK Ada from  ...  We have validated this approach through the specification and development of a substantial safety-critical system incorporating both software and programmable logic components, and the development of tools  ...  We made no detailed estimates of the practicality of implementing the design, or of the compilation errors that could plausibly occur.  ... 
doi:10.21954/ou.ro.0000f5b2 fatcat:2jmjhbz4kjet7cgpfdkjbplg3q