Sciweavers

329 search results - page 25 / 66
» A Survey of Lightweight-Cryptography Implementations
Sort
View
AIIDE
2008
13 years 10 months ago
Explicit Knowledge Programming for Computer Games
The main aim of this paper is to raise awareness of higherorder knowledge (knowledge about someone else's knowledge) as an issue for computer game AI. We argue that a number ...
Andreas Witzel, Jonathan A. Zvesper, Ethan Kennerl...
SNPD
2008
13 years 9 months ago
Tools and Techniques for Model Checking Networked Programs
For software executing several threads in parallel, testing is unreliable, as it cannot cover all thread schedules. Model checking, however, can cover all possible thread interlea...
Cyrille Artho, Watcharin Leungwattanakit, Masami H...
TNC
2004
146views Education» more  TNC 2004»
13 years 9 months ago
Connective Middleware for Voice and Integrated Communications
To engage Internet2 users in an exploration of peer-to-peer, real-time communications, these users require connectivity. Superior networking connectivity alone is not sufficient. ...
Ben Teitelbaum
WCE
2007
13 years 8 months ago
Manufacturing industries need Design of Experiments (DoE)
— Although experimentation is a frequent activity of engineers, they usually use primitive strategies to carry on their experiments. A survey identifies the needs of using an eff...
Martín Tanco, Elisabeth Viles, Laura Ilzarb...
PDPTA
2000
13 years 9 months ago
Constant Multipliers for FPGAs
This paper presents a survey of techniques to implement multiplications by constants on FPGAs. It shows in particular that a simple and well-known technique, canonical signed recod...
Florent de Dinechin, Vincent Lefèvre