Sciweavers

1467 search results - page 240 / 294
» Computing with Electronic Nanotechnologies
Sort
View
INFORMATICALT
2008
105views more  INFORMATICALT 2008»
13 years 7 months ago
Public Key Authentication Schemes for Local Area Networks
The invention of public-key cryptography makes many new network applications, such as electronic commerce (CE), possible. However, the widely used Internet is open and unprotected....
Tzungher Chen, Gwoboa Horng, Chuan-Sheng Yang
JCC
2008
92views more  JCC 2008»
13 years 7 months ago
Two-electron integral evaluation on the graphics processor unit
: We propose the algorithm to evaluate the Coulomb potential in the ab initio density functional calculation on the graphics processor unit (GPU). The numerical accuracy required f...
Koji Yasuda
CPHYSICS
2007
65views more  CPHYSICS 2007»
13 years 7 months ago
Plasma etching and feature evolution of organic low-k material by using VicAddress
Plasma process is a highly selective technique exploiting the individual or mixed function of positive ions, electrons, neutral radicals, and photons produced by low temperature p...
T. Makabe, T. Shimada, T. Yagisawa
JOT
2008
122views more  JOT 2008»
13 years 7 months ago
UML and Object Oriented Drama
Readers of this article have probably seen, at least once, diagrams produced using the UML (Unified Modeling Language). Some of you have perhaps used UML for your own work and kno...
Luca Vetti Tagliati, Carlo Caloro
JUCS
2008
144views more  JUCS 2008»
13 years 7 months ago
Applications of Mash-ups for a Digital Journal
: The WWW is currently experiencing a revolutionary growth due to numerous emerging tools, techniques and concepts. Digital journals thus need to transform themselves to cope with ...
Muhammad Salman Khan, Narayanan Kulathuramaiyer, H...