Sciweavers

122 search results - page 23 / 25
» agile 2008
Sort
View
CHES
2008
Springer
132views Cryptology» more  CHES 2008»
13 years 7 months ago
Light-Weight Instruction Set Extensions for Bit-Sliced Cryptography
Bit-slicing is a non-conventional implementation technique for cryptographic software where an n-bit processor is considered as a collection of n 1-bit execution units operating in...
Philipp Grabher, Johann Großschädl, Dan...
ESEM
2008
ACM
13 years 7 months ago
Strength of evidence in systematic reviews in software engineering
Systematic reviews are only as good as the evidence they are based on. It is important, therefore, that users of systematic reviews know how much confidence they can place in the ...
Tore Dybå, Torgeir Dingsøyr
ISTA
2008
13 years 7 months ago
Evolving and Implanting Web-Based E-Government-Systems in Universities
Abstract. The Bologna Process [1] has triggered a major restructuring of the current university diploma into a bachelor/master system. As one effect, the administration effort for ...
Dirk Reiss, Bernhard Rumpe, Marvin Schulze-Quester...
AROBOTS
2008
177views more  AROBOTS 2008»
13 years 5 months ago
Controlling swimming and crawling in a fish robot using a central pattern generator
Online trajectory generation for robots with multiple degrees of freedom is still a difficult and unsolved problem, in particular for non-steady state locomotion, that is, when th...
Alessandro Crespi, Daisy Lachat, Ariane Pasquier, ...
JSAC
2008
161views more  JSAC 2008»
13 years 5 months ago
HC-MAC: A Hardware-Constrained Cognitive MAC for Efficient Spectrum Management
Abstract--Radio spectrum resource is of fundamental importance for wireless communication. Recent reports show that most available spectrum has been allocated. While some of the sp...
Juncheng Jia, Qian Zhang, Xuemin Shen