One of the objectives of ooDBMSs is to use type-speci c methods for manipulating objects, in order to maintain the consistency of the database. This is, however, little help for t...
We present a hardware architecture for an Elliptic Curve Cryptography System performing the three basic cryptographic schemes: DH key generation, encryption and digital signature....
We present a rigorous but transparent semantics definition of SystemVerilog that covers processes with blocking and non-blocking statements as well as their interaction with the s...
Martin Zambaldi, Wolfgang Ecker, T. Kruse, W. M&uu...
Anti-aliasing in form factor computation and precise determination of shadow boundaries are important issiresfor Radiosity method. A-Buffer is a technique introduced by Carpenter ...
Q. Wang, J. H. Tang, C. H. Lim, H. C. Teh, Z. Y. H...
Existing schemes for object layout and dispatch in the presence of multiple inheritance and separate compilation waste space and are slower than systems with single inheritance. T...