Sciweavers

28244 search results - page 5398 / 5649
» System Design for Flexibility
Sort
View
ASPLOS
2000
ACM
15 years 9 months ago
Architectural Support for Fast Symmetric-Key Cryptography
The emergence of the Internet as a trusted medium for commerce and communication has made cryptography an essential component of modern information systems. Cryptography provides ...
Jerome Burke, John McDonald, Todd M. Austin
SIGGRAPH
2000
ACM
15 years 9 months ago
Interactive manipulation of rigid body simulations
Physical simulation of dynamic objects has become commonplace in computer graphics because it produces highly realistic animations. In this paradigm the animator provides few phys...
Jovan Popovic, Steven M. Seitz, Michael Erdmann, Z...
CRYPTO
2000
Springer
134views Cryptology» more  CRYPTO 2000»
15 years 9 months ago
Taming the Adversary
Abstract. While there is a great deal of sophistication in modern cryptology, simple (and simplistic) explanations of cryptography remain useful and perhaps necessary. Many of the ...
Martín Abadi
ISCA
2010
IEEE
176views Hardware» more  ISCA 2010»
15 years 9 months ago
Forwardflow: a scalable core for power-constrained CMPs
Chip Multiprocessors (CMPs) are now commodity hardware, but commoditization of parallel software remains elusive. In the near term, the current trend of increased coreper-socket c...
Dan Gibson, David A. Wood
EH
1999
IEEE
351views Hardware» more  EH 1999»
15 years 9 months ago
Evolvable Hardware or Learning Hardware? Induction of State Machines from Temporal Logic Constraints
Here we advocate an approach to learning hardware based on induction of finite state machines from temporal logic constraints. The method involves training on examples, constraint...
Marek A. Perkowski, Alan Mishchenko, Anatoli N. Ch...
« Prev « First page 5398 / 5649 Last » Next »