Sciweavers

628 search results - page 98 / 126
» On the Twofish Key Schedule
Sort
View
MICRO
2008
IEEE
88views Hardware» more  MICRO 2008»
14 years 2 months ago
Facelift: Hiding and slowing down aging in multicores
Processors progressively age during their service life due to normal workload activity. Such aging results in gradually slower circuits. Anticipating this fact, designers add timi...
Abhishek Tiwari, Josep Torrellas
INFOCOM
2007
IEEE
14 years 2 months ago
PRIME: Peer-to-Peer Receiver-drIven MEsh-Based Streaming
Abstract—The success of swarming content delivery has motivated a new approach to live Peer-to-Peer (P2P) streaming that we call mesh-based streaming. In this approach, participa...
Nazanin Magharei, Reza Rejaie
ECUMN
2007
Springer
14 years 2 months ago
A PKI Approach Targeting the Provision of a Minimum Security Level within Internet
After decades of expansion, Internet became an essential tool useful for professionals and private individuals providing a large range of services like emailing, management of ban...
Maryline Laurent-Maknavicius
EUROCAST
2007
Springer
102views Hardware» more  EUROCAST 2007»
14 years 2 months ago
Trajectory Planning in a Crossroads for a Fleet of Driverless Vehicles
In the context of Intelligent Transportation Systems based on driverless vehicles, one important issue is the passing of a crossroads. This paper presents a supervised reservation ...
Olivier Mehani, Arnaud de La Fortelle
MODELS
2007
Springer
14 years 2 months ago
Modeling Time(s)
Abstract. Time and timing features are an important aspect of modern electronic systems, often of embedded nature. We argue here that in early design phases, time is often of logic...
Charles André, Frédéric Malle...