Sciweavers

JCP
2008
142views more  JCP 2008»
13 years 4 months ago
Design and Verification of Loosely Coupled Inter-Organizational Workflows with Multi-Level Security
Inter-Organizational Workflows (IOWF) become important as they provide solution for data sharing, heterogeneity in resources and work coordination at global level. However, a secur...
Boleslaw Mikolajczak, Nirmal Gami
JCP
2008
120views more  JCP 2008»
13 years 4 months ago
High Throughput VLSI Architecture for Blackman Windowing in Real Time Spectral Analysis
This paper presents a high throughput VLSI architecture for Blackman windowing. Since most of the implementation of windowing functions for real time applications, are based on eit...
Kailash Chandra Ray, A. S. Dhar
JCP
2008
128views more  JCP 2008»
13 years 4 months ago
Life Cycle for Change Management in Business Processes using Semantic Technologies
In a fast changing market environment the task of reducing the downtime for change management of business processes has high importance. Ensuring that IT reflects the updated busin...
Uttam Kumar Tripathi, Knut Hinkelmann, Daniela Fel...
JCP
2008
97views more  JCP 2008»
13 years 4 months ago
Profiling Tools for FPGA-Based Embedded Systems: Survey and Quantitative Comparison
Profiling tools are computer-aided design (CAD) tools that help in determining the computationally intensive portions in software. Embedded systems consist of hardware and software...
Jason G. Tong, Mohammed A. S. Khalid
JCP
2008
97views more  JCP 2008»
13 years 4 months ago
Vocal Tract Area Function Estimation Using Particle Swarm
-- The problem of estimating the Vocal Tract Area Functions (VTAF) from speech signals arise in many applications. However, the existing methods for solving this problem were desig...
Mahmoud A. Ismail
JCP
2008
119views more  JCP 2008»
13 years 4 months ago
Performance Comparisons, Design, and Implementation of RC5 Symmetric Encryption Core using Reconfigurable Hardware
With the wireless communications coming to homes and offices, the need to have secure data transmission is of utmost importance. Today, it is important that information is sent con...
Omar S. Elkeelany, Adegoke Olabisi