Sciweavers

2961 search results - page 393 / 593
» Optimization of tele-immersion codes
Sort
View
FSE
1997
Springer
81views Cryptology» more  FSE 1997»
15 years 8 months ago
XMX: A Firmware-Oriented Block Cipher Based on Modular Multiplications
Abstract. This paper presents xmx, a new symmetric block cipher optimized for public-key libraries and microcontrollers with arithmetic coprocessors. xmx has no S-boxes and uses on...
David M'Raïhi, David Naccache, Jacques Stern,...
WCRE
1996
IEEE
15 years 8 months ago
A Catalog of Object Model Transformations
The process of software development is gradually achieving more rigor. Proficient developers now construct indirectly through the abstraction of models. Models allow a developer t...
Michael R. Blaha, William J. Premerlani
IFIP
1992
Springer
15 years 8 months ago
Implementations of IF-statements in the TODOS microarchitecture synthesis system
In microarchitecure synthesis, early algorithms considered only a single implementation technique for IF -statements. Focus was on scheduling and on maximum hardware sharing. In t...
Peter Marwedel
ICSE
2000
IEEE-ACM
15 years 7 months ago
Improvement of a configuration management system
The company CAD-UL AG develops software tools for embedded systems. Single tools as compilers, linkers and debuggers are offered as well as complete development tool chains for th...
Frank Titze
PLILP
1994
Springer
15 years 7 months ago
Deriving Residual Reference Count Garbage Collectors
We present a strategy to derive an efficient reference count garbage collector for any applicative program by only modifying it on the source code level. The key to the approach is...
Wolfram Schulte