Sciweavers

66 search results - page 10 / 14
» aes 2008
Sort
View
AES
2008
Springer
97views Cryptology» more  AES 2008»
13 years 7 months ago
Software mechanisms for extensible and scalable 3D visualization of construction operations
This paper presents research that led to the design and implementation of an extensible and scalable software framework for the dynamic 3D visualization of simulated construction ...
Vineet R. Kamat, Julio C. Martínez
AES
2008
Springer
133views Cryptology» more  AES 2008»
13 years 7 months ago
Alternative neural networks to estimate the scour below spillways
Artificial neural networks (ANN's) are associated with difficulties like lack of success in a given problem and unpredictable level of accuracy that could be achieved. In eve...
H. Md. Azamathulla, M. C. Deo, P. B. Deolalikar
IJCSA
2008
102views more  IJCSA 2008»
13 years 7 months ago
New Information and Communication Technologies for the Teaching of Computer Graphic Design
Within the computer aided design (CAD) teaching framework, new information and communication technologies (ICT's) are being set through new tools and methodological changes: ...
G. del Rio-Cidoncha, J. Martinez-Palacios, E. Mart...
TIT
2008
78views more  TIT 2008»
13 years 7 months ago
Recursive Lower Bounds on the Nonlinearity Profile of Boolean Functions and Their Applications
The nonlinearity profile of a Boolean function (i.e. the sequence of its minimum Hamming distances nlr(f) to all functions of degrees at most r, for r 1) is a cryptographic crite...
Claude Carlet
TVLSI
2008
144views more  TVLSI 2008»
13 years 7 months ago
Reconfigurable Hardware for High-Security/ High-Performance Embedded Systems: The SAFES Perspective
Abstract--Embedded systems present significant security challenges due to their limited resources and power constraints. This paper focuses on the issues of building secure embedde...
Guy Gogniat, Tilman Wolf, Wayne P. Burleson, Jean-...