CMOS Circuit Simulation Using Latency Insertion Method (Englisch)
- Neue Suche nach: Sekine, T.
- Neue Suche nach: Asai, H.
- Neue Suche nach: Sekine, T.
- Neue Suche nach: Asai, H.
In:
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES E SERIES A
;
92
, 10
;
2546-2553
;
2009
-
ISSN:
- Aufsatz (Zeitschrift) / Print
-
Titel:CMOS Circuit Simulation Using Latency Insertion Method
-
Beteiligte:Sekine, T. ( Autor:in ) / Asai, H. ( Autor:in )
-
Erschienen in:
-
Verlag:
- Neue Suche nach: Institute of Electronics, Information and Communication Engineers
-
Erscheinungsdatum:01.01.2009
-
Format / Umfang:8 pages
-
ISSN:
-
Medientyp:Aufsatz (Zeitschrift)
-
Format:Print
-
Sprache:Englisch
- Neue Suche nach: 621.382
- Weitere Informationen zu Dewey Decimal Classification
-
Klassifikation:
DDC: 621.382 -
Datenquelle:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Inhaltsverzeichnis – Band 92, Ausgabe 10
Zeige alle Jahrgänge und Ausgaben
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 2393
-
Slepian-Wolf Coding of Individual Sequences Based on Ensembles of Linear FunctionsKuzuoka, S. et al. | 2009
- 2402
-
Decoding of Separately Encoded Multiple Correlated Sources Transmitted over Noisy ChannelsKobayashi, K. / Yamazato, T. / Katayama, M. et al. | 2009
- 2411
-
Complexity-Reducing Algorithm for Serial Scheduled Min-Sum Decoding of LDPC CodesUchikawa, H. / Harada, K. et al. | 2009
- 2418
-
Adaptive Decoding Algorithms for Low-Density Parity-Check Codes over the Binary Erasure ChannelHosoya, G. / Yagi, H. / Kobayashi, M. / Hirasawa, S. et al. | 2009
- 2431
-
An Efficient Signature Scheme with Fast Online SigningYoun, T.-Y. / Park, Y.-H. / Lim, J. et al. | 2009
- 2438
-
Security Enhancement of Various MPKCs by 2-Layer Nonlinear Piece in Hand MethodTsujii, S. / Tadaki, K. / Fujita, R. / Gotaishi, M. / Kaneko, T. et al. | 2009
- 2447
-
Efficient Pseudorandom-Function Modes of a Block-Cipher-Based Hash FunctionHirose, S. / Kuwakado, H. et al. | 2009
- 2454
-
Efficient Compression of Web GraphsAsano, Y. / Miyawaki, Y. / Nishizeki, T. et al. | 2009
- 2463
-
Parallel Processing of Distributed Video Coding to Reduce Decoding TimeTonomura, Y. / Nakachi, T. / Fujii, T. / Kiya, H. et al. | 2009
- 2471
-
A Novel Bandelet-Based Image InpaintingHung, K.-M. / Chen, Y.-L. / Hsieh, C.-T. et al. | 2009
- 2479
-
LDPC Convolutional Codes Based on Parity Check Polynomials with a Time Period of 3Murakami, Y. / Okamura, S. / Okasaka, S. / Kishigami, T. / Orihashi, M. et al. | 2009
- 2484
-
On Relationship between the Boston Bound and Well-Known Bounds for Cyclic CodesZheng, J. / Kaida, T. et al. | 2009
- 2487
-
Strong Anonymous SignatureZhang, R. / Imai, H. et al. | 2009
- 2492
-
On the Effect of an Invertible Code on Block Undelivered Probability in Cooperative Multi-Hop Relaying NetworksSakakibara, K. / Taketsugu, J. et al. | 2009
- 2495
-
ISI-Free Power Roll-Off PulseMohri, M. / Hamamura, M. et al. | 2009
- 2499
-
A Novel Robust Impulsive Chaos Synchronization Approach for Uncertain Complex Dynamical NetworksMahdavi Mazdeh, N. / Menhaj, M.B. / Talebi, H.A. et al. | 2009
- 2508
-
Stochastic Resonance in an Array of Locally-Coupled McCulloch-Pitts Neurons with Population HeterogeneityUtagawa, A. / Sahashi, T. / Asai, T. / Amemiya, Y. et al. | 2009
- 2514
-
An Extended Method of SIRMs Connected Fuzzy Inference Method Using Kernel MethodSeki, H. / Mizuguchi, F. / Watanabe, S. / Ishii, H. / Mizumoto, M. et al. | 2009
- 2522
-
Moment Vector Equation for Nonlinear Systems and Its Application to Optimal ControlSatoh, H. et al. | 2009
- 2531
-
Accurate Method for Calculating the Effective Capacitance with RC Loads Based on the Thevenin ModelJiang, M. / Huang, Z. / Kurokawa, A. / Fang, S. / Inoue, Y. et al. | 2009
- 2540
-
The Mixed Time-Frequency Steady-State Analysis Method for Nonlinear Circuits Driven by Multitone SignalsKuwazaki, T. / Shirataki, J. / Okumura, M. et al. | 2009
- 2546
-
CMOS Circuit Simulation Using Latency Insertion MethodSekine, T. / Asai, H. et al. | 2009
- 2554
-
A Fixed Point Theorem in Weak Topology for Successively Recurrent System of Set-Valued Mapping Equations and Its ApplicationsHoriuchi, K. et al. | 2009
- 2560
-
Image Restoration Using a Universal GMM Learning and Adaptive Wiener FilterYamane, N. / Tabuchi, M. / Morikawa, Y. et al. | 2009
- 2572
-
A Reversible Image Authentication Method without Memorization of Hiding ParametersHan, S. / Fujiyoshi, M. / Kiya, H. et al. | 2009
- 2580
-
Transformation of BDD into Heterogeneous MDD with Minimal CostStojkovic, S. / Stankovic, M. / Stankovic, R.S. et al. | 2009
- 2588
-
Double Space Time Transmit Diversity OFDM System with Antenna Shuffling in Spatial Correlated Frequency Selective MIMO ChannelsZhou, L. / Shimizu, M. et al. | 2009
- 2600
-
Performance of Reed-Solomon Coded MC-DS-CDMA with Bi-orthogonal ModulationTanaka, H. / Jang, K.W. / Yamasaki, S. / Haseyama, M. et al. | 2009
- 2609
-
A Multi-Sensing-Range Method for Efficient Position Estimation by Passive RFID TechnologyHori, T. / Wada, T. / Uchitomi, N. / Mutsuura, K. / Okada, H. et al. | 2009
- 2618
-
A Multistage Method for Multiobjective Route SelectionWen, F. / Gen, M. et al. | 2009
- 2626
-
A Windowing Frequency Domain Adaptive Filter for Acoustic Echo CancellationWu, S. / Qiu, X. et al. | 2009
- 2629
-
Iterative Learning Control with Advanced Output Data Using Partially Known Impulse ResponseJeong, G.-M. / Choi, C.-H. / Ahn, H.-S. et al. | 2009
- 2633
-
New Balanced Boolean Functions with Good Cryptographic PropertiesWang, Q. / Xue, X. / Kan, H. et al. | 2009
- 2638
-
Comments on an ID-Based Authenticated Group Key Agreement Protocol with Withstanding Insider AttacksWu, T.-Y. / Tseng, Y.-M. et al. | 2009
- 2641
-
Security Vulnerability of ID-Based Key Sharing SchemesHwang, J.Y. / Youn, T.-Y. / Susilo, W. et al. | 2009
- 2644
-
On the Security of a Conditional Proxy Re-EncryptionZhang, X. / Chen, M.-R. et al. | 2009