Sciweavers

1769 search results - page 79 / 354
» An implementation of argument based discussion
Sort
View
PDPTA
2000
15 years 6 months ago
Constant Multipliers for FPGAs
This paper presents a survey of techniques to implement multiplications by constants on FPGAs. It shows in particular that a simple and well-known technique, canonical signed recod...
Florent de Dinechin, Vincent Lefèvre
LATINCRYPT
2010
15 years 3 months ago
How Leaky Is an Extractor?
This paper discusses the security of a leakage-resilient stream cipher presented at FOCS 2008, instantiated in a practical setting. Based on a case study, we put forward implementa...
François-Xavier Standaert
112
Voted
JUCS
2006
85views more  JUCS 2006»
15 years 4 months ago
A Pervasive Multimodal Tele-Home Healthcare System
: This paper proposes a Human-centered Pervasive Computing System Model (HPC), a Layered Architectural Analysis and Design Method (LAAD) and a Waterfall Prototyping Process Model (...
Zhenjiang Miao, Baozong Yuan, Mengsun Yu
128
Voted
CORR
2010
Springer
124views Education» more  CORR 2010»
15 years 2 months ago
Lattice model refinement of protein structures
To find the best lattice model representation of a given full atom protein structure is a hard computational problem. Several greedy methods have been suggested where results are ...
Martin Mann, Alessandro Dal Palù
PDP
1995
IEEE
15 years 8 months ago
Iterated Runge-Kutta methods on distributed memory multiprocessors
We investigate the parallel implementation of the diagonal{implicitly iterated Runge{ Kutta (DIIRK) method, an iteration method based on a predictor{corrector scheme. This method ...
Thomas Rauber, Gudula Rünger