Sciweavers

1418 search results - page 109 / 284
» How to Explain Mistakes
Sort
View
HICSS
2002
IEEE
93views Biometrics» more  HICSS 2002»
14 years 2 months ago
Using Event Semantics for Modeling Contracts
Currently a number of these on-line support systems for electronic contracting are under development. In this paper we develop a logical formalism to represent the content of busi...
Yao-Hua Tan, Walter Thoen
ISCAS
2002
IEEE
72views Hardware» more  ISCAS 2002»
14 years 2 months ago
Delta-sigma modulator topologies with high immunity to pattern noise
This paper addresses the problem of pattern noise encountered in single-stage delta-sigma modulators in the presence of a DC input signal. By utilizing state-space matrices, we ex...
G. Fischer, Deokhwan Hyun
NOMS
2002
IEEE
122views Communications» more  NOMS 2002»
14 years 2 months ago
An embedded Web server architecture for XML-based network management
Embedded Web servers are widely used today for IP-based element management. In this paper, we present a new management architecture that combines this technology with XML, DOM, an...
Hong-Taek Ju, Mi-Jung Choi, Sehee Han, Yunjung Oh,...
VISUALIZATION
2002
IEEE
14 years 2 months ago
Case Study: Interactive Visualization for Internet Security
Internet connectivity is defined by a set of routing protocols which let the routers that comprise the Internet backbone choose the best route for a packet to reach its destinati...
Soon Tee Teoh, Kwan-Liu Ma, Shyhtsun Felix Wu, Xia...
FSE
2010
Springer
180views Cryptology» more  FSE 2010»
14 years 2 months ago
Fast Software AES Encryption
This paper presents new software speed records for AES-128 encryption for architectures at both ends of the performance spectrum. On the one side we target the low-end 8-bit AVR mi...
Dag Arne Osvik, Joppe W. Bos, Deian Stefan, David ...