نتایج جستجو برای: asynchronous sequential logic

تعداد نتایج: 254650  

Journal: :Theor. Comput. Sci. 2011
Jan A. Bergstra Jaco van de Pol

We present a complete axiomatisation for four-valued sequential logic. It consists of nine axioms, from which all valid laws can be derived by equational reasoning. These nine axioms are independent of each other. © 2011 Elsevier B.V. All rights reserved.

2000
R. Mariani R. Saletti

In this paper the Event-oriented Logic, an innovative approach to system design, is presented. It is proposed for the first time to give to both signal levels and signal transitions a logical meaning, so that the information content per wire is increased as in multiple-valued logic. The new technique is applied to asynchronous systems and possible handshake models have been studied. One of thes...

1998
Kåre T. Christensen Peter Jensen Peter Korger Jens Sparsø

This paper presents the design of an asynchronous version of the TR4101 embedded microprocessor core developed by LSI Logic Inc. The asynchronous processor, called ARISC, was designed using the same CAD tools and the same standard cell library that was used to implement the TR4101. The paper reports on the design methodology, the architecture, the implementation, and the performance of the ARIS...

Journal: :Cryptography 2022

Key-based circuit obfuscation or logic-locking is a technique that can be used to hide the full design of an integrated from untrusted foundry end-user. The based on creating ambiguity in original by inserting “key” input bits into such unintelligible absent correct secret key. Clock signals have traditionally been avoided locking order not corrupt timing behavior locked circuit. In this paper,...

2003
Dale Miller

At the Dolev-Yao level of abstraction, security protocols can be specified using multisets rewriting. Such rewriting can be modeled naturally using proof search in linear logic. The linear logic setting also provides a simple mechanism for generating nonces and session and encryption keys via eigenvariables. We illustrate several additional aspects of this direct encoding of protocols into logi...

2003

At the Dolev-Yao level of abstraction, security protocols can be specified using multisets rewriting. Such rewriting can be modeled naturally using proof search in linear logic. The linear logic setting also provides a simple mechanism for generating nonces and session and encryption keys via eigenvariables. We illustrate several additional aspects of this direct encoding of protocols into logi...

2003
Iliano Cervesato Béchir Ktari Hanane Houmani Mohamed Mejri

At the Dolev-Yao level of abstraction, security protocols can be specified using multisets rewriting. Such rewriting can be modeled naturally using proof search in linear logic. The linear logic setting also provides a simple mechanism for generating nonces and session and encryption keys via eigenvariables. We illustrate several additional aspects of this direct encoding of protocols into logi...

Journal: :IEEE Transactions on Appiled Superconductivity 1997

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید