Sciweavers

1499 search results - page 283 / 300
» Case Study: An Implementation of a Secure Steganographic Sys...
Sort
View
GG
2008
Springer
14 years 10 months ago
Model-Driven Development of Model Transformations
The model-driven development of model transformations requires both a technique to model model transformations as well as a means to transform transformation models. Therefore, t...
Pieter Van Gorp
81
Voted
CEE
2007
110views more  CEE 2007»
14 years 9 months ago
HW/SW co-design for public-key cryptosystems on the 8051 micro-controller
It is a challenge to implement large word length public-key algorithms on embedded systems. Examples are smartcards, RF-ID tags and mobile terminals. This paper presents a HW/SW c...
Kazuo Sakiyama, Lejla Batina, Bart Preneel, Ingrid...
CN
2004
142views more  CN 2004»
14 years 9 months ago
Adaptive video streaming: pre-encoded MPEG-4 with bandwidth scaling
The increasing popularity of streaming video is a cause for concern for the stability of the Internet because most streaming video content is currently delivered via UDP, without ...
Alex Balk, Mario Gerla, Dario Maggiorini, M. Y. Sa...
ICSM
2007
IEEE
15 years 3 months ago
Evaluation of Semantic Interference Detection in Parallel Changes: an Exploratory Experiment
Parallel developments are becoming increasingly prevalent in the building and evolution of large-scale software systems. Our previous studies of a large industrial project showed ...
Danhua Shao, Sarfraz Khurshid, Dewayne E. Perry
97
Voted
INFOCOM
2009
IEEE
15 years 4 months ago
FS2You: Peer-Assisted Semi-Persistent Online Storage at a Large Scale
—It has been widely acknowledged that online storage systems within the “cloud” of the Internet provide services of a substantial value to end users who wish to share files ...
Ye Sun, Fangming Liu, Bo Li, Baochun Li, Xinyan Zh...