Sciweavers

694 search results - page 102 / 139
» Comparison of software architecture reverse engineering meth...
Sort
View
ARCS
2004
Springer
15 years 5 months ago
Cryptonite - A Programmable Crypto Processor Architecture for High-Bandwidth Applications
Cryptographic methods are widely used within networking and digital rights management. Numerous algorithms exist, e.g. spanning VPNs or distributing sensitive data over a shared ne...
Rainer Buchty, Nevin Heintze, Dino Oliva
COMSWARE
2006
IEEE
15 years 5 months ago
WLAN location sharing through a privacy observant architecture
Abstract— In the last few years, WLAN has seen immense growth and it will continue this trend due to the fact that it provides convenient connectivity as well as high speed links...
Kavitha Muthukrishnan, Nirvana Meratnia, Maria Eva...
TASLP
2010
134views more  TASLP 2010»
14 years 6 months ago
Autoregressive Models of Amplitude Modulations in Audio Compression
We present a scalable medium bit-rate wide-band audio coding technique based on frequency domain linear prediction (FDLP). FDLP is an efficient method for representing the long-ter...
Sriram Ganapathy, Petr Motlícek, Hynek Herm...
LCTRTS
2010
Springer
15 years 6 months ago
Analysis and approximation for bank selection instruction minimization on partitioned memory architecture
A large number of embedded systems include 8-bit microcontrollers for their energy efficiency and low cost. Multi-bank memory architecture is commonly applied in 8-bit microcontr...
Minming Li, Chun Jason Xue, Tiantian Liu, Yingchao...
IM
2007
15 years 1 months ago
Policy-driven Business Management over Web Services
Service-oriented Architecture allows for reusable services to be composed in such a way that business tasks or activities are easily satisfied. However, currently there is a abst...
Stephen Gorton, Stephan Reiff-Marganiec