Sciweavers

1005 search results - page 141 / 201
» On genomic coding theory
Sort
View
INDOCRYPT
2007
Springer
14 years 1 months ago
Linearization Attacks Against Syndrome Based Hashes
Abstract. In MyCrypt 2005, Augot, Finiasz, and Sendrier proposed FSB, a family of cryptographic hash functions. The security claim of the FSB hashes is based on a coding theory pro...
Markku-Juhani Olavi Saarinen
XPU
2007
Springer
14 years 1 months ago
Up-Front Interaction Design in Agile Development
Abstract. In this paper we address how interaction design and agile development work together, with a focus on the issue of interaction design being done “up-front”, before sof...
Jennifer Ferreira, James Noble, Robert Biddle
DATE
2006
IEEE
151views Hardware» more  DATE 2006»
14 years 1 months ago
Designing MRF based error correcting circuits for memory elements
As devices are scaled to the nanoscale regime, it is clear that future nanodevices will be plagued by higher soft error rates and reduced noise margins. Traditional implementation...
Kundan Nepal, R. Iris Bahar, Joseph L. Mundy, Will...
MSR
2006
ACM
14 years 1 months ago
Mining eclipse for cross-cutting concerns
Software may contain functionality that does not align with its architecture. Such cross-cutting concerns do not exist from the beginning but emerge over time. By analysing where ...
Silvia Breu, Thomas Zimmermann, Christian Lindig
ASAP
2005
IEEE
87views Hardware» more  ASAP 2005»
14 years 1 months ago
Expression Synthesis in Process Networks generated by LAURA
The COMPAAN/LAURA [18] tool chain maps nested loop applications written in Matlab onto reconfigurable platforms, such as FPGAs. COMPAAN rewrites the original Matlab application a...
Claudiu Zissulescu, Bart Kienhuis, Ed F. Depretter...