Sciweavers

219 search results - page 29 / 44
» Context-aware counter abstraction
Sort
View
FPL
1999
Springer
74views Hardware» more  FPL 1999»
15 years 1 months ago
On Tool Integration in High-Performance FPGA Design Flows
Abstract. High-performance design flows for FPGAs often rely on module generators to counter coarse logic-block granularity and limited routing resources, However, the very flexi...
Andreas Koch
78
Voted
ICPP
1993
IEEE
15 years 1 months ago
Meta-State Conversion
Abstract — In MIMD (Multiple Instruction stream, Multiple Data stream) execution, each processor has its own state. Although these states are generally considered to be independe...
Henry G. Dietz, G. Krishnamurthy
AINTEC
2006
Springer
15 years 1 months ago
Proactive Resilience to Dropping Nodes in Mobile Ad Hoc Networks
Abstract. Proactive routing protocols for mobile ad hoc networks currently offer few mechanisms to detect and/or counter malevolent nodes. Stability and performance of most, if not...
Ignacy Gawedzki, Khaldoun Al Agha
131
Voted
ASIAN
2009
Springer
308views Algorithms» more  ASIAN 2009»
14 years 10 months ago
Automated Security Proof for Symmetric Encryption Modes
Abstract. We presents a compositional Hoare logic for proving semantic security of modes of operation for symmetric key block ciphers. We propose a simple programming language to s...
Martin Gagné, Pascal Lafourcade, Yassine La...
CORR
2010
Springer
67views Education» more  CORR 2010»
14 years 9 months ago
Profile Popularity in a Business-oriented Online Social Network
Abstract--Analysing Online Social Networks (OSN), voluntarily maintained and automatically exploitable databases of electronic personal information, promises a wealth of insight in...
Thorsten Strufe