Sciweavers

469 search results - page 80 / 94
» On Cipher Design Based on Switchable Controlled Operations
Sort
View
ACSD
2003
IEEE
151views Hardware» more  ACSD 2003»
14 years 1 days ago
Communicating Transaction Processes
Message Sequence Charts (MSC) have been traditionally used to depict execution scenarios in the early stages of design cycle. MSCs portray inter-process ( inter-object) interactio...
Abhik Roychoudhury, P. S. Thiagarajan
CGVR
2006
13 years 8 months ago
A Comparison of Real and Virtual 3D Construction Tools with Novice Users
In this paper, we present the results of a comparative evaluation of a "virtual Lego" system against real Lego bricks with novice users. The virtual Lego system was desi...
Hooman Baradaran, Wolfgang Stürzlinger
ISSA
2004
13 years 8 months ago
High Data Rate 8-Bit Crypto Processor
This paper describes a high data rate 8-bit Crypto Processor based on Advanced Encryption Standard (Rijndael algorithm). Though the algorithm requires 32-bit wide data path but ou...
Sheikh Muhammad Farhan
ESA
2010
Springer
162views Algorithms» more  ESA 2010»
13 years 7 months ago
Solving an Avionics Real-Time Scheduling Problem by Advanced IP-Methods
We report on the solution of a real-time scheduling problem that arises in the design of software-based operation control of aircraft. A set of tasks has to be distributed on a min...
Friedrich Eisenbrand, Karthikeyan Kesavan, Raju S....
FMSD
2006
140views more  FMSD 2006»
13 years 6 months ago
Dealing with practical limitations of distributed timed model checking for timed automata
Two base algorithms are known for reachability verification over timed automata. They are called forward and backwards, and traverse the automata edges using either successors or p...
Víctor A. Braberman, Alfredo Olivero, Ferna...