Sciweavers

477 search results - page 28 / 96
» Comparative Analysis of Architectural Views Based on UML
Sort
View
ISCA
2000
IEEE
91views Hardware» more  ISCA 2000»
14 years 2 days ago
Performance analysis of the Alpha 21264-based Compaq ES40 system
This paper evaluates performance characteristics of the Compaq ES40 shared memory multiprocessor. The ES40 system contains up to four Alpha 21264 CPU’s together with a high-perf...
Zarka Cvetanovic, Richard E. Kessler
CAISE
2009
Springer
14 years 2 months ago
Enterprise Meta Modeling Methods - Combining a Stakeholder-Oriented and a Causality-Based Approach
Meta models are the core of enterprise architecture, but still few methods are available for the creation of meta models tailored for specific purposes. This paper presents two app...
Robert Lagerström, Jan Saat, Ulrik Franke, St...
CIIT
2004
13 years 9 months ago
Analysis and improvements of the eventing protocol for universal plug and play
UPnP is a widely-spread connectivity standard, which allows networked devices to cooperate in an autonomous fashion by using functionality found on the network. In this article we...
Y. Mazuryk, Johan J. Lukkien
IEEEPACT
2000
IEEE
14 years 2 days ago
Region Formation Analysis with Demand-Driven Inlining for Region-Based Optimization
Region-based compilation repartitions a program into more desirable compilation units for optimization and scheduling, particularly beneficial for ILP architectures. With region-...
Tom Way, Ben Breech, Lori L. Pollock
ISCAS
2002
IEEE
112views Hardware» more  ISCAS 2002»
14 years 19 days ago
Tradeoff analysis of FPGA based elliptic curve cryptography
FPGAs are an attractive platform for elliptic curve cryptography hardware. Since field multiplication is the most critical operation in elliptic curve cryptography, we have studi...
Marcus Bednara, M. Daldrup, Jürgen Teich, Joa...