Sciweavers

23406 search results - page 108 / 4682
» Architecture, Design, Implementation
Sort
View
123
Voted
CASES
2009
ACM
15 years 10 months ago
Hardware evaluation of the Luffa hash family
Efficient hardware architectures for the Luffa hash algorithm are proposed in this work. We explore different tradeoffs and propose several architectures, targeting both compac...
Miroslav Knezevic, Ingrid Verbauwhede
119
Voted
AVI
2000
15 years 4 months ago
An Architecture for Pen-based Interaction on Electronic Whiteboards
This paper describes the software architecture for our pen-based electronic whiteboard system, called Flatland. The design goal of Flatland is to support various activities on per...
Takeo Igarashi, W. Keith Edwards, Anthony LaMarca,...
145
Voted
DAC
1997
ACM
15 years 7 months ago
System Level Fixed-Point Design Based on an Interpolative Approach
The design process for xed-point implementations either in software or in hardware requires a bit-true speci cation of the algorithm in order to analyze quantization e ects on an...
Markus Willems, Volker Bürsgens, Holger Kedin...
132
Voted
COMCOM
1998
83views more  COMCOM 1998»
15 years 3 months ago
The design of the TAO real-time object request broker
Many real-time application domains can benefit from flexible and open distributed architectures, such as those defined by the CORBA specification. CORBA is an architecture for...
Douglas C. Schmidt, David L. Levine, Sumedh Mungee
211
Voted
ESSOS
2011
Springer
14 years 7 months ago
An Architecture-Centric Approach to Detecting Security Patterns in Software
Abstract. Today, software security is an issue with increasing importance. Developers, software designers, end users, and enterprises have their own needs w.r.t. software security....
Michaela Bunke, Karsten Sohr