Sciweavers

218 search results - page 26 / 44
» Composite Binary Losses
Sort
View
IPPS
2003
IEEE
15 years 5 months ago
A Performance Interface for Component-Based Applications
This work targets the emerging use of software component technology for high-performance scientific parallel and distributed computing. While component software engineering will ...
Sameer Shende, Allen D. Malony, Craig Edward Rasmu...
SACRYPT
2001
Springer
106views Cryptology» more  SACRYPT 2001»
15 years 4 months ago
Fast Normal Basis Multiplication Using General Purpose Processors
—For cryptographic applications, normal bases have received considerable attention, especially for hardware implementation. In this article, we consider fast software algorithms ...
Arash Reyhani-Masoleh, M. Anwarul Hasan
125
Voted
EUROCRYPT
2000
Springer
15 years 3 months ago
Cryptanalysis of Patarin's 2-Round Public Key System with S Boxes (2R)
In a series of papers Patarin proposes new efficient public key systems. A very interesting proposal, called 2-Round Public Key System with S Boxes, or 2R, is based on the difficul...
Eli Biham
CORR
2010
Springer
120views Education» more  CORR 2010»
14 years 10 months ago
Implementing Distributed Controllers for Systems with Priorities
is a challenging problem. We consider here abstract specifications consisting of a composition of components and a controller given in the form of a set of interactions and a prior...
Imene Ben Hafaiedh, Susanne Graf, Hammadi Khairall...
KMGOV
2004
Springer
15 years 5 months ago
Ontology-Enabled E-gov Service Configuration: An Overview of the OntoGov Project
Abstract. For electronic government initiatives to succeed, in addition to modernising the front office, attention should be also paid in order to streamline, reorganise and suppor...
Efthimios Tambouris, Stelios Gorilas, Gregory Kava...