Sciweavers

71 search results - page 14 / 15
» A Step Towards Practical Steganography Systems
Sort
View
VLSID
2007
IEEE
154views VLSI» more  VLSID 2007»
14 years 8 months ago
Model Based Test Generation for Microprocessor Architecture Validation
Functional validation of microprocessors is growing in complexity in current and future microprocessors. Traditionally, the different components (or validation collaterals) used i...
Sreekumar V. Kodakara, Deepak Mathaikutty, Ajit Di...
INFOCOM
2008
IEEE
14 years 2 months ago
Cell Selection in 4G Cellular Networks
—Cell selection is the process of determining the cell(s) that provide service to each mobile station. Optimizing these processes is an important step towards maximizing the util...
David Amzallag, Reuven Bar-Yehuda, Danny Raz, Gabr...
ATAL
2007
Springer
14 years 1 months ago
Goals in the context of BDI plan failure and planning
We develop a Belief-Desire-Intention (BDI) style agent-oriented programming language with special emphasis on the semantics of goals in the presence of the typical BDI failure han...
Sebastian Sardiña, Lin Padgham
ITCC
2005
IEEE
14 years 1 months ago
Inversion-Free Arithmetic on Genus 3 Hyperelliptic Curves and Its Implementations
Recently, a lot of effort has been done to investigate all kinds of explicit formulae for speeding up group operation of hyperelliptic curve cryptosystem (HECC). In this paper, ex...
Xinxin Fan, Thomas J. Wollinger, Yumin Wang
WISA
2004
Springer
14 years 29 days ago
Hyperelliptic Curve Coprocessors on a FPGA
Abstract. Cryptographic algorithms are used in a large variety of different applications to ensure security services. It is, thus, very interesting to investigate various implement...
Howon Kim, Thomas J. Wollinger, YongJe Choi, Kyoil...