Sciweavers

1468 search results - page 255 / 294
» On Industrial Use of Requirements Engineering Techniques
Sort
View
RECONFIG
2008
IEEE
268views VLSI» more  RECONFIG 2008»
14 years 4 months ago
Parametric, Secure and Compact Implementation of RSA on FPGA
1 We present a fast, efficient, and parameterized modular multiplier and a secure exponentiation circuit especially intended for FPGAs on the low end of the price range. The desig...
Ersin Oksuzoglu, Erkay Savas
MM
2005
ACM
179views Multimedia» more  MM 2005»
14 years 3 months ago
rStream: resilient peer-to-peer streaming with rateless codes
The inherent instability and unreliability of peer-to-peer networks introduce several fundamental engineering challenges to multimedia streaming over peer-to-peer networks. First,...
Chuan Wu, Baochun Li
SARA
2009
Springer
14 years 2 months ago
Rewriting Constraint Models with Metamodels
An important challenge in constraint programming is to rewrite constraint models into executable programs calculating the solutions. This phase of constraint processing may requir...
Raphaël Chenouard, Laurent Granvilliers, Rica...
UML
2001
Springer
14 years 2 months ago
Modeling the User Interface of Web Applications with UML
Today's User Interfaces (UIs) are complex software components, which play an essential role in the usability of an application. The development of UIs requires therefore, not ...
Rolf Hennicker, Nora Koch
SCCC
1997
IEEE
14 years 2 months ago
Reactive Ranking for Cooperative Databases
A cooperative database allows the user to specify approximate or vague query conditions. A vague query requires the database system to rank the retrieved answers according to thei...
Berthier A. Ribeiro-Neto, Guilherme T. de Assis