نتایج جستجو برای: asynchronous sequential logic
تعداد نتایج: 254650 فیلتر نتایج به سال:
We present a complete axiomatisation for four-valued sequential logic. It consists of nine axioms, from which all valid laws can be derived by equational reasoning. These nine axioms are independent of each other. © 2011 Elsevier B.V. All rights reserved.
In this paper the Event-oriented Logic, an innovative approach to system design, is presented. It is proposed for the first time to give to both signal levels and signal transitions a logical meaning, so that the information content per wire is increased as in multiple-valued logic. The new technique is applied to asynchronous systems and possible handshake models have been studied. One of thes...
This paper presents the design of an asynchronous version of the TR4101 embedded microprocessor core developed by LSI Logic Inc. The asynchronous processor, called ARISC, was designed using the same CAD tools and the same standard cell library that was used to implement the TR4101. The paper reports on the design methodology, the architecture, the implementation, and the performance of the ARIS...
Key-based circuit obfuscation or logic-locking is a technique that can be used to hide the full design of an integrated from untrusted foundry end-user. The based on creating ambiguity in original by inserting “key” input bits into such unintelligible absent correct secret key. Clock signals have traditionally been avoided locking order not corrupt timing behavior locked circuit. In this paper,...
At the Dolev-Yao level of abstraction, security protocols can be specified using multisets rewriting. Such rewriting can be modeled naturally using proof search in linear logic. The linear logic setting also provides a simple mechanism for generating nonces and session and encryption keys via eigenvariables. We illustrate several additional aspects of this direct encoding of protocols into logi...
At the Dolev-Yao level of abstraction, security protocols can be specified using multisets rewriting. Such rewriting can be modeled naturally using proof search in linear logic. The linear logic setting also provides a simple mechanism for generating nonces and session and encryption keys via eigenvariables. We illustrate several additional aspects of this direct encoding of protocols into logi...
At the Dolev-Yao level of abstraction, security protocols can be specified using multisets rewriting. Such rewriting can be modeled naturally using proof search in linear logic. The linear logic setting also provides a simple mechanism for generating nonces and session and encryption keys via eigenvariables. We illustrate several additional aspects of this direct encoding of protocols into logi...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید