Sciweavers

3310 search results - page 582 / 662
» Aspect-aware operating system development
Sort
View
111
Voted
ASAP
2004
IEEE
127views Hardware» more  ASAP 2004»
15 years 6 months ago
A Public-Key Cryptographic Processor for RSA and ECC
We describe a general-purpose processor architecture for accelerating public-key computations on server systems that demand high performance and flexibility to accommodate large n...
Hans Eberle, Nils Gura, Sheueling Chang Shantz, Vi...
EDBTW
2006
Springer
15 years 6 months ago
Data Stream Sharing
Abstract. Recent research efforts in the fields of data stream processing and data stream management systems (DSMSs) show the increasing importance of processing data streams, e. g...
Richard Kuntschke, Alfons Kemper
113
Voted
FDTC
2006
Springer
102views Cryptology» more  FDTC 2006»
15 years 6 months ago
Cryptographic Key Reliable Lifetimes: Bounding the Risk of Key Exposure in the Presence of Faults
With physical attacks threatening the security of current cryptographic schemes, no security policy can be developed without taking into account the physical nature of computation....
Alfonso De Gregorio
GECCO
2006
Springer
179views Optimization» more  GECCO 2006»
15 years 6 months ago
Parisian evolution with honeybees for three-dimensional reconstruction
This paper introduces a novel analogy with the way in which honeybee colonies operate in order to solve the problem of sparse and quasi dense reconstruction. To successfully solve...
Gustavo Olague, Cesar Puente
122
Voted
WER
2000
Springer
15 years 6 months ago
Non-Functional Requirements for Object-Oriented Modeling
Recently, it has been pointed out that the majority of the requirements engineering methods do not take into account non-functional requirements (NFRs) [10][11]. Consequently, we h...
Jaime de Melo Sabat Neto, Julio Cesar Sampaio do P...