Sciweavers

2015 search results - page 59 / 403
» Hidden Software Capabilities
Sort
View
ARCS
2010
Springer
14 years 13 days ago
A Hierarchical Distributed Control for Power and Performances Optimization of Embedded Systems
Power and resource management are key goals for the success of modern battery-supplied multimedia devices. This kind of devices are usually based on SoCs with a wide range of subsy...
Patrick Bellasi, William Fornaciari, David Siorpae...
EWSPT
2000
Springer
14 years 22 days ago
A CMM-Based Evaluation of the V-Model 97
The V-Model 97 is a widely used process model in Germany and Europe. It is the development standard for IT-Systems of the Federal Republic of Germany and the basis of Austria'...
Viktor Schuppan, Winfried Rußwurm
OOIS
2001
Springer
14 years 1 months ago
Guiding Use Case Driven Requirements Elicitation and Analysis
Use cases are often perceived as an integral part of an objectoriented approach to software development, yet despite claims that objects fall naturally from the use case descripti...
Keith Phalp, Karl Cox
FC
1999
Springer
97views Cryptology» more  FC 1999»
14 years 1 months ago
Playing "Hide and Seek" with Stored Keys
In this paper we consider the problem of efficiently locating cryptographic keys hidden in gigabytes of data, such as the complete file system of a typical PC. We describe efficie...
Adi Shamir, Nicko van Someren
CORR
2010
Springer
178views Education» more  CORR 2010»
13 years 9 months ago
Fast Histograms using Adaptive CUDA Streams
Histograms are widely used in medical imaging, network intrusion detection, packet analysis and other streambased high throughput applications. However, while porting such software...
Sisir Koppaka, Dheevatsa Mudigere, Srihari Narasim...