Sciweavers

980 search results - page 166 / 196
» The Architecture Tradeoff Analysis Method
Sort
View
HICSS
2008
IEEE
130views Biometrics» more  HICSS 2008»
15 years 10 months ago
Enterprise Modeling for Information System Development within MDA
Object-oriented analysis suggests semiformal usecase driven techniques for problem domain modeling from a computation independent viewpoint. The proposed approach called Topologic...
Janis Osis, Erika Asnina
MMSEC
2006
ACM
132views Multimedia» more  MMSEC 2006»
15 years 10 months ago
On achievable security levels for lattice data hiding in the known message attack scenario
This paper presents a theoretical security analysis of lattice data hiding. The security depends on the secrecy of a dither signal that randomizes the codebook. If the same secret...
Luis Pérez-Freire, Fernando Pérez-Go...
MOBICOM
2009
ACM
15 years 8 months ago
Understanding cross-band interference in unsynchronized spectrum access
We consider the problem of cross-band interference when devices from the same or different networks share radio spectrum. Cross-band interference occurs when unsynchronized trans...
Wei Hou, Lei Yang, Lin Zhang, Xiuming Shan, Heathe...
CGO
2004
IEEE
15 years 8 months ago
Software-Controlled Operand-Gating
Operand gating is a technique for improving processor energy efficiency by gating off sections of the data path that are unneeded by short-precision (narrow) operands. A method fo...
Ramon Canal, Antonio González, James E. Smi...
138
Voted
IRREGULAR
1995
Springer
15 years 7 months ago
Run-Time Parallelization of Irregular DOACROSS Loops
Dependencies between iterations of loop structures cannot always be determined at compile-time because they may depend on input data which is known only at run-time. A prime examp...
V. Prasad Krothapalli, Thulasiraman Jeyaraman, Mar...