Sciweavers

500 search results - page 40 / 100
» codes 1998
Sort
View
SIGCSE
1998
ACM
102views Education» more  SIGCSE 1998»
14 years 28 days ago
Design patterns for data structures
tterns help narrow the gap between the abstract views of the data structures and their concrete implementations. The smaller the gap, the higher the level action. The more abstract...
Dung Nguyen
WSC
1998
13 years 10 months ago
Multi-factor Analysis of Firm-level Performance through Feed-forward, Feed-back Relationships
This article presents the results of research to develop a descriptive model of firm-level productivity that will allow a myriad of factor interactions to be directly accounted fo...
Young H. Park, David M. Miller
TC
1998
13 years 8 months ago
Cipher Instruction Search Attack on the Bus-Encryption Security Microcontroller DS5002FP
Abstract—A widely used bus-encryption microprocessor is vulnerable to a new practical attack. This type of processor decrypts onthe-fly while fetching code and data, which are st...
Markus G. Kuhn
TIT
1998
77views more  TIT 1998»
13 years 8 months ago
A Rate-Distortion Theorem for Arbitrary Discrete Sources
— A rate-distortion theorem for arbitrary (not necessarily stationary or ergodic) discrete-time finite-alphabet sources is given. This result, which provides the expression of t...
Po-Ning Chen, Fady Alajaji
CSMR
1998
IEEE
14 years 29 days ago
Protection Reconfiguration for Reusable Software
Secure distributed applications often include code to authenticate users, verify access rights, and establish secure communication channels between software components (e.g., clie...
Christian Damsgaard Jensen, Daniel Hagimont