Sciweavers

193 search results - page 14 / 39
» A New Redundancy Reducing Cipher
Sort
View
ACSC
2004
IEEE
13 years 11 months ago
Strength Reduction for Loop-Invariant Types
Types are fundamental for enforcing levels of abstraction in modern high-level programming languages and their lower-level representations. However, some type-related features suc...
Phung Hua Nguyen, Jingling Xue
ASAP
2003
IEEE
124views Hardware» more  ASAP 2003»
14 years 1 months ago
Arbitrary Bit Permutations in One or Two Cycles
Symmetric-key block ciphers encrypt data, providing data confidentiality over the public Internet. For inter-operability reasons, it is desirable to support a variety of symmetric...
Zhijie Shi, Xiao Yang, Ruby B. Lee
ICPADS
2007
IEEE
14 years 2 months ago
Statistical trust establishment in wireless sensor networks
Abstract— We present a new distributed approach that establishes reputation-based trust among sensor nodes in order to identify malfunctioning and malicious sensor nodes and mini...
Matthew J. Probst, Sneha Kumar Kasera
ECLIPSE
2006
ACM
14 years 1 months ago
JASPER: an Eclipse plug-in to facilitate software maintenance tasks
Recent research has shown that developers spend significant amounts of time navigating around code. Much of this time is spent on redundant navigations to code that the developer ...
Michael J. Coblenz, Andrew Jensen Ko, Brad A. Myer...
GLVLSI
2003
IEEE
152views VLSI» more  GLVLSI 2003»
14 years 1 months ago
Dynamic single-rail self-timed logic structures for power efficient synchronous pipelined designs
The realization of fast datapaths in signal processing environments requires fastest, power efficient logic styles with synchronous behavior. This paper presents a method to combi...
Frank Grassert, Dirk Timmermann