Sciweavers

628 search results - page 87 / 126
» On the Twofish Key Schedule
Sort
View
ENTCS
2007
98views more  ENTCS 2007»
13 years 8 months ago
Evaluating Complex MAC Protocols for Sensor Networks with APMC
In this paper we present an analysis of a MAC (Medium Access Control) protocol for wireless sensor networks. The purpose of this protocol is to manage wireless media access by con...
Michaël Cadilhac, Thomas Hérault, Rich...
JSS
2007
82views more  JSS 2007»
13 years 8 months ago
The impacts of software product management
The success of any product depends on the skills and competence of the product manager. This article evaluates the relevance of good product management on the success of a product...
Christof Ebert
CN
2002
91views more  CN 2002»
13 years 7 months ago
VERA: an extensible router architecture
We recognize two trends in router design: increasing pressure to extend the set of services provided by the router and increasing diversity in the hardware components used to cons...
Scott Karlin, Larry L. Peterson
ICDE
2009
IEEE
156views Database» more  ICDE 2009»
14 years 2 months ago
Support Multi-version Applications in SaaS via Progressive Schema Evolution
— Update of applications in SaaS is expected to be a continuous efforts and cannot be done overnight or over the weekend. In such migration efforts, users are trained and shifted...
Jianfeng Yan, Bo Zhang
CGO
2008
IEEE
14 years 2 months ago
Latency-tolerant software pipelining in a production compiler
In this paper we investigate the benefit of scheduling non-critical loads for a higher latency during software pipelining. "Noncritical" denotes those loads that have s...
Sebastian Winkel, Rakesh Krishnaiyer, Robyn Sampso...