3D integration is a promising advanced manufacturing process offering a variety of new hardware security protection opportunities. This paper presents a way of securing 3D ICs using Hamiltonian pathsâ€¦ (More)

This work considers weak deterministic BÃ¼chi automata reading encodings of non-negative d-vectors of reals in a fixed base. A saturated language is a language which contains all encoding of elementsâ€¦ (More)

We consider the three graph search algorithm LexDFS, LexUP and LexDOWN. We show that the graph search LexUP can be computed in linear time by an algorithm similar to the one which compute LexBFS.â€¦ (More)

A = {x | Ï†(x)}. If x âˆˆ A we should be able to produce a proof of Ï†(x). If x / âˆˆ A we should be able to produce a proof of Â¬Ï†(x). How does the size of the proof vary with |x|? We now describe aâ€¦ (More)

We show that descriptive complexityâ€™s result extends in High Order Logic to capture the expressivity of Turing Machine which have a finite number of alternation and whose time or space is bounded byâ€¦ (More)

This work considers weak deterministic BÃ¼chi automata reading encodings of non-negative reals in a fixed base. A Real Number Automaton is an automaton which recognizes all encoding of elements of aâ€¦ (More)