Sciweavers

5961 search results - page 1116 / 1193
» Design Science and Software Engineering
Sort
View
ARCS
2004
Springer
14 years 4 months ago
Cryptonite - A Programmable Crypto Processor Architecture for High-Bandwidth Applications
Cryptographic methods are widely used within networking and digital rights management. Numerous algorithms exist, e.g. spanning VPNs or distributing sensitive data over a shared ne...
Rainer Buchty, Nevin Heintze, Dino Oliva
ARCS
2004
Springer
14 years 4 months ago
The Value of Handhelds in Smart Environments
Abstract. The severe resource restrictions of computer-augmented everyday artifacts imply substantial problems for the design of applications in smart environments. Some of these p...
Frank Siegemund, Christian Floerkemeier, Harald Vo...
EMSOFT
2004
Springer
14 years 4 months ago
Garbage collection for embedded systems
Security concerns on embedded devices like cellular phones make Java an extremely attractive technology for providing third-party and user-downloadable functionality. However, gar...
David F. Bacon, Perry Cheng, David Grove
SIGADA
2004
Springer
14 years 4 months ago
Comparative analysis of genetic algorithm implementations
Genetic Algorithms provide computational procedures that are modeled on natural genetic system mechanics, whereby a coded solution is “evolved” from a set of potential solutio...
Robert Soricone, Melvin Neville
INFOVIS
2003
IEEE
14 years 4 months ago
Multiscale Visualization of Small World Networks
Many networks under study in Information Visualization are “small world” networks. These networks first appeared in the study social networks and were shown to be relevant mod...
David Auber, Yves Chiricota, Fabien Jourdan, Guy M...
« Prev « First page 1116 / 1193 Last » Next »