Sciweavers

2030 search results - page 312 / 406
» Designing Complex Software Implementation Programs
Sort
View
FC
1997
Springer
86views Cryptology» more  FC 1997»
15 years 6 months ago
The SPEED Cipher
Abstract. SPEED is a private key block cipher. It supports three variable parameters: (1) data length — the length of a plaintext/ciphertext of SPEED can be 64, 128 or 256 bits. ...
Yuliang Zheng
CASES
2006
ACM
15 years 5 months ago
Power efficient branch prediction through early identification of branch addresses
Ever increasing performance requirements have elevated deeply pipelined architectures to a standard even in the embedded processor domain, requiring the incorporation of dynamic b...
Chengmo Yang, Alex Orailoglu
AVI
2004
15 years 3 months ago
Display space usage and window management operation comparisons between single monitor and multiple monitor users
The continuing trend toward greater processing power, larger storage, and in particular increased display surface by using multiple monitor supports increased multi-tasking by the...
Dugald Ralph Hutchings, Greg Smith, Brian Meyers, ...
COLING
1996
15 years 3 months ago
Communication in large distributed AI Systems for Natural Language Processing
We. are going to describe the design and implementatior, of a connnuniealion system l.or large AI projects, capable of supporting various software components in a heterogeneous ha...
Jan W. Amtrup, Jörg Benra
SPLC
2007
15 years 3 months ago
Variability Management for Product Lines with XVCL
Managing variability is the essence of software product line (PL) practice. With many variant features and complex dependencies among them, it also becomes a major challenge for e...
Stan Jarzabek