Sciweavers

503 search results - page 84 / 101
» Data Flow Analysis for CCS
Sort
View
VLSISP
2008
111views more  VLSISP 2008»
13 years 7 months ago
Design Methodology for Throughput Optimum Architectures of Hash Algorithms of the MD4-class
Abstract. In this paper we propose an architecture design methodology to optimize the throughput of MD4-based hash algorithms. The proposed methodology includes an iteration bound ...
Yong Ki Lee, Herwin Chan, Ingrid Verbauwhede
CONCURRENCY
2002
110views more  CONCURRENCY 2002»
13 years 7 months ago
Parallel visualization of gigabyte datasets in GeoFEM
Parallel visualization of large datasets in GeoFEM is described. Our visualization subsystem supports concurrent visualization with computation, and outputs a simplified small gra...
Issei Fujishiro, Li Chen, Yuriko Takeshima, Hiroko...
ISJ
2002
212views more  ISJ 2002»
13 years 7 months ago
Assessing and managing the benefits of enterprise systems: the business manager's perspective
This paper focuses on the benefits that organizations may achieve from their investment in enterprise systems (ES). It proposes an ES benefit framework for summarizing benefits in ...
Shari Shang, Peter B. Seddon
ACSAC
2008
IEEE
14 years 2 months ago
Improving Security Visualization with Exposure Map Filtering
Flow based analysis of network traffic is commonly used to analyze and understand security-related events. Graphical analysis helps analysts detect patterns or behaviors that woul...
Mansour Alsaleh, David Barrera, Paul C. van Oorsch...
ICNP
2005
IEEE
14 years 1 months ago
Typed Abstraction of Complex Network Compositions
straction of Complex Network Compositions∗ Azer Bestavros, Adam D. Bradley, Assaf J. Kfoury, and Ibrahim Matta Department of Computer Science Boston University The heterogeneity...
Azer Bestavros, Adam Bradley, Assaf J. Kfoury, Ibr...