Sciweavers

3310 search results - page 582 / 662
» Aspect-aware operating system development
Sort
View
ASAP
2004
IEEE
127views Hardware» more  ASAP 2004»
14 years 29 days ago
A Public-Key Cryptographic Processor for RSA and ECC
We describe a general-purpose processor architecture for accelerating public-key computations on server systems that demand high performance and flexibility to accommodate large n...
Hans Eberle, Nils Gura, Sheueling Chang Shantz, Vi...
EDBTW
2006
Springer
14 years 27 days ago
Data Stream Sharing
Abstract. Recent research efforts in the fields of data stream processing and data stream management systems (DSMSs) show the increasing importance of processing data streams, e. g...
Richard Kuntschke, Alfons Kemper
FDTC
2006
Springer
102views Cryptology» more  FDTC 2006»
14 years 27 days ago
Cryptographic Key Reliable Lifetimes: Bounding the Risk of Key Exposure in the Presence of Faults
With physical attacks threatening the security of current cryptographic schemes, no security policy can be developed without taking into account the physical nature of computation....
Alfonso De Gregorio
GECCO
2006
Springer
179views Optimization» more  GECCO 2006»
14 years 26 days ago
Parisian evolution with honeybees for three-dimensional reconstruction
This paper introduces a novel analogy with the way in which honeybee colonies operate in order to solve the problem of sparse and quasi dense reconstruction. To successfully solve...
Gustavo Olague, Cesar Puente
WER
2000
Springer
14 years 23 days ago
Non-Functional Requirements for Object-Oriented Modeling
Recently, it has been pointed out that the majority of the requirements engineering methods do not take into account non-functional requirements (NFRs) [10][11]. Consequently, we h...
Jaime de Melo Sabat Neto, Julio Cesar Sampaio do P...