Sciweavers

3820 search results - page 504 / 764
» Bounded Model Debugging
Sort
View
136
Voted
ISW
2000
Springer
15 years 7 months ago
A Signcryption Scheme Based on Integer Factorization
Abstract. Signcryption is a public-key cryptographic primitive introduced by Zheng, which achieves both message confidentiality and nonrepudiatable origin authenticity, at a lower ...
Ron Steinfeld, Yuliang Zheng
127
Voted
IWSAPF
2000
15 years 7 months ago
Software Connectors and Refinement in Family Architectures
Product families promote reuse of software artifacts such as architectures, designs and implementations. Product family architectures are difficult to create due to the need to sup...
Alexander Egyed, Nikunj R. Mehta, Nenad Medvidovic
115
Voted
PACS
2000
Springer
110views Hardware» more  PACS 2000»
15 years 7 months ago
Compiler-Directed Dynamic Frequency and Voltage Scheduling
Dynamic voltage and frequency scaling has been identified as one of the most effective ways to reduce power dissipation. This paper discusses a compilation strategy that identifies...
Chung-Hsing Hsu, Ulrich Kremer, Michael S. Hsiao
118
Voted
RT
2000
Springer
15 years 7 months ago
Metropolis Light Transport for Participating Media
Abstract. In this paper we show how Metropolis Light Transport can be extended both in the underlying theoretical framework and the algorithmic implementation to incorporate volume...
Mark Pauly, Thomas Kollig, Alexander Keller
FPGA
1995
ACM
120views FPGA» more  FPGA 1995»
15 years 7 months ago
Synthesis of Signal Processing Structured Datapaths for FPGAs Supporting RAMs and Busses
A novel approach is presented for transforming a given scheduled and bound signal processing algorithm for a multiplexer based datapath to a BUS/RAM based FPGA datapath. A datapat...
Baher Haroun, Behzad Sajjadi