Sciweavers

1711 search results - page 306 / 343
» Completing pseudojump operators
Sort
View
ISSA
2004
13 years 9 months ago
High Data Rate 8-Bit Crypto Processor
This paper describes a high data rate 8-bit Crypto Processor based on Advanced Encryption Standard (Rijndael algorithm). Though the algorithm requires 32-bit wide data path but ou...
Sheikh Muhammad Farhan
ECIS
2003
13 years 9 months ago
Using online services in untrusted environments: a privacy-preserving architecture
While online service providers are sometimes accused of forwarding identifying customer information as name and address to untrusted third parties, comparatively little attention ...
Claus Boyens, Oliver Günther
NETWORKING
2004
13 years 9 months ago
Stealth Multicast: A Novel Catalyst for Network-Level Multicast Deployment
While network-level multicast has tremendous potential for increasing the efficiency of group-oriented applications, the adoption of network-level multicast has been tepid at best....
Aaron Striegel
INTERACT
2003
13 years 9 months ago
Be Quiet? Evaluating Proactive and Reactive User Interface Assistants
: This research examined the ability of an anthropomorphic interface assistant to help people learn and use an unfamiliar text-editing tool, with a specific focus on assessing proa...
Jun Xiao, Richard Catrambone, John T. Stasko
IWFM
2003
172views Formal Methods» more  IWFM 2003»
13 years 9 months ago
On Continuous Models of Computation: Towards Computing the Distance Between (Logic) Programs
We present a report on work in progress on certain aspects of a programme of research concerned with building formal, mathematical models both for aspects of the computational pro...
Anthony Karel Seda, Máire Lane