Sciweavers

1631 search results - page 221 / 327
» Extreme Programming - Back to Basics
Sort
View
CASES
2009
ACM
14 years 2 months ago
Automatic detection of fault attack and countermeasures
Security of smart cards is continuously threatened by many software and hardware attacks. Those attacks focus on giving secret information that are stored in the card like PIN cod...
Ahmadou A. Sere, Julien Iguchi-Cartigny, Jean-Loui...
FPL
2001
Springer
123views Hardware» more  FPL 2001»
14 years 2 months ago
Compilation Increasing the Scheduling Scope for Multi-memory-FPGA-Based Custom Computing Machines
This paper presents new achievements on the automatic mapping of algorithms, written in imperative software programming languages, to custom computing machines. The reconfigurable ...
João M. P. Cardoso, Horácio C. Neto
HICSS
2000
IEEE
208views Biometrics» more  HICSS 2000»
14 years 2 months ago
Transfer Capability Computations in Deregulated Power Systems
With the recent trend towards deregulating power systems around the world, transfer capability computation emerges as the key issue to a smoothly running power market with multipl...
Mohamed Shaaban, Yixin Ni, Felix F. Wu
IPPS
2000
IEEE
14 years 2 months ago
An Open Market-Based Architecture for Distributed Computing
One of the challenges in large scale distributed computing is to utilize the thousands of idle personal computers. In this paper, we present a system that enables users to e ortles...
Spyros Lalis, Alexandros Karypidis
ITICSE
2000
ACM
14 years 2 months ago
Pedagogical power tools for teaching Java
We describe a Java toolkit that is designed to support the creation of powerful and extensible GUI interfaces during the first year computer science course. The goals of this tool...
Jeff Raab, Richard Rasala, Viera K. Proulx