Sciweavers

3747 search results - page 597 / 750
» Active Operations on Collections
Sort
View
ICCD
1999
IEEE
115views Hardware» more  ICCD 1999»
14 years 2 months ago
Customization of a CISC Processor Core for Low-Power Applications
This paper describes a core-customization process of a CISC processor core for a given application program. It aims at the power reduction in the CISC processor core by fully util...
You-Sung Chang, Bong-Il Park, In-Cheol Park, Chong...
ISSS
1999
IEEE
151views Hardware» more  ISSS 1999»
14 years 2 months ago
Optimized System Synthesis of Complex RT Level Building Blocks from Multirate Dataflow Graphs
In order to cope with the ever increasing complexity of todays application specific integrated circuits, a building block based design methodology is established. The system is co...
Jens Horstmannshoff, Heinrich Meyr
RIDE
1999
IEEE
14 years 2 months ago
Establishing Virtual Enterprises by Means of Mobile Agents
Electronic Commerce is expanding from the simple notion of Electronic Store to the notion of Virtual Enterprises (VE) where existing enterprises dynamically form temporary allianc...
Panos K. Chrysanthis, Sujata Banerjee, Shi-Kuo Cha...
WECWIS
1999
IEEE
164views ECommerce» more  WECWIS 1999»
14 years 2 months ago
Effect of Bargaining in Electronic Commerce
Internet business has grown at an unprecedented rate in the past several years. Recent research has found that the functions provided by a store have a significant impact on custo...
Ting-Peng Liang, Her-Sen Doong
PKC
1999
Springer
102views Cryptology» more  PKC 1999»
14 years 2 months ago
How to Enhance the Security of Public-Key Encryption at Minimum Cost
This paper presents a simple and efficient conversion from a semantically secure public-key encryption scheme against passive adversaries to a non-malleable (or semantically secure...
Eiichiro Fujisaki, Tatsuaki Okamoto