Sciweavers

1722 search results - page 245 / 345
» Dedication
Sort
View
101
Voted
JSA
2007
139views more  JSA 2007»
15 years 16 days ago
High-speed hardware implementations of Elliptic Curve Cryptography: A survey
For the last decade, Elliptic Curve Cryptography (ECC) has gained increasing acceptance in the industry and the academic community and has been the subject of several standards. T...
Guerric Meurice de Dormale, Jean-Jacques Quisquate...
88
Voted
JSAC
2007
95views more  JSAC 2007»
15 years 16 days ago
Experiences in implementing an experimental wide-area GMPLS network
In this article, we describe our experiences in implementing an experimental wide-area GMPLS network called CHEETAH (Circuit-Switched End-to-End Transport Architecture). The key c...
Xiangfei Zhu, Xuan Zheng, Malathi Veeraraghavan
TVLSI
2008
144views more  TVLSI 2008»
15 years 16 days ago
Reconfigurable Hardware for High-Security/ High-Performance Embedded Systems: The SAFES Perspective
Abstract--Embedded systems present significant security challenges due to their limited resources and power constraints. This paper focuses on the issues of building secure embedde...
Guy Gogniat, Tilman Wolf, Wayne P. Burleson, Jean-...
135
Voted
ACS
2002
15 years 16 days ago
Categorical Abstract Algebraic Logic: Algebraizable Institutions
cal Abstract Algebraic Logic: Algebraizable Institutions To Don Pigozzi this work is dedicated GEORGE VOUTSADAKIS Department of Mathematics, Iowa State University, Ames, IA 50011 U...
George Voutsadakis
72
Voted
AIL
2002
81views more  AIL 2002»
15 years 16 days ago
Ownership: A case study in the representation of legal concepts
This article is an exercise in computational jurisprudence. It seems clear that the field of AI and Law should draw upon the insights of legal philosophers, whenever possible. But...
L. Thorne McCarty