Sciweavers

450 search results - page 41 / 90
» codes 1999
Sort
View
IMA
1999
Springer
69views Cryptology» more  IMA 1999»
14 years 2 months ago
Some Applications of Bounds for Designs to the Cryptography
Recent years have seen numerous examples when designs play an important role in the study of such topics in cryptography as secrecy and authentication codes, secret sharing scheme...
Svetla Nikova, Ventzislav Nikov
HPCN
1998
Springer
14 years 2 months ago
Evaluation of Two Compiler-Based Approaches for the Parallelisation of an MPEG-2 Decoder
In this paper, we evaluate two different approaches for the compiler-based parallelisation of a C program for MPEG-2 decoding. The first approach experiments with a commercial auto...
Arnaud Laffitte, Rizos Sakellariou, John R. Gurd
DEXAW
1999
IEEE
98views Database» more  DEXAW 1999»
14 years 2 months ago
Shaping the Research Agenda for Security in E-Commerce
In this paper, we overview the current state-of-the-art and future trends in network security and argue that the security requirements of electronic commerce (e-commerce) applicat...
Rolf Oppliger
SIGCSE
1999
ACM
93views Education» more  SIGCSE 1999»
14 years 2 months ago
Patterns for decoupling data structures and algorithms
In order to build a data structure that is extensible and reusable, it is necessary to decouple the intrinsic and primitive behavior of the structure from the application specific...
Dung Zung Nguyen, Stephen B. Wong
ICSM
1999
IEEE
14 years 2 months ago
Recovering High-Level Views of Object-Oriented Applications from Static and Dynamic Information
Recovering architectural documentation from code is crucial to maintaining and reengineering software systems. Reverse engineering and program understanding approaches are often l...
Tamar Richner, Stéphane Ducasse