Sciweavers

3482 search results - page 634 / 697
» Designing for security
Sort
View
ISSA
2004
13 years 11 months ago
High Data Rate 8-Bit Crypto Processor
This paper describes a high data rate 8-bit Crypto Processor based on Advanced Encryption Standard (Rijndael algorithm). Though the algorithm requires 32-bit wide data path but ou...
Sheikh Muhammad Farhan
DS
1997
104views Database» more  DS 1997»
13 years 11 months ago
Managing Constraint Violations in Administrative Information Systems
This paper motivates a comprehensive methodological framework for dealing with some aspects of real-world complexity in information system analysis and design. By complex applicat...
I. Boydens, Alain Pirotte, Esteban Zimányi
WOTUG
2007
13 years 11 months ago
Integrating and Extending JCSP
This paper presents the extended and re-integrated JCSP library of CSP packages for Java. It integrates the differing advances made by Quickstone’s JCSP Network Edition and the â...
Peter H. Welch, Neil Brown, James Moores, Kevin Ch...
CDC
2009
IEEE
126views Control Systems» more  CDC 2009»
13 years 11 months ago
Support vector machine classifiers for sequential decision problems
Classification problems in critical applications such as health care or security often require very high reliability because of the high costs of errors. In order to achieve this r...
Eladio Rodriguez Diaz, David A. Castaon
DLS
2008
264views Languages» more  DLS 2008»
13 years 11 months ago
Contextual values
Context-oriented programming proposes to treat execution context explicitly and to provide means for context-dependent adaptation at runtime. There are many mechanisms that can be...
Éric Tanter