Sciweavers

11573 search results - page 2136 / 2315
» Designing Relational Databases
Sort
View
112
Voted
CRYPTO
2004
Springer
112views Cryptology» more  CRYPTO 2004»
15 years 9 months ago
Feistel Schemes and Bi-linear Cryptanalysis
Abstract. In this paper we introduce the method of bi-linear cryptanalysis (BLC), designed specifically to attack Feistel ciphers. It allows to construct periodic biased character...
Nicolas Courtois
147
Voted
FPGA
2004
ACM
126views FPGA» more  FPGA 2004»
15 years 9 months ago
A synthesis oriented omniscient manual editor
The cost functions used to evaluate logic synthesis transformations for FPGAs are far removed from the final speed and routability determined after placement, routing and timing a...
Tomasz S. Czajkowski, Jonathan Rose
148
Voted
GECCO
2004
Springer
179views Optimization» more  GECCO 2004»
15 years 9 months ago
An Evolutionary Meta Hierarchical Scheduler for the Linux Operating System
Abstract. The need for supporting CSCW applications with heterogeneous and varying user requirements calls for adaptive and reconfigurable schedulers accommodating a mixture of re...
Horst Wedde, Muddassar Farooq, Mario Lischka
115
Voted
COMPSAC
2003
IEEE
15 years 9 months ago
Just What Could Possibly Go Wrong In B2B Integration?
One important trend in enterprise-scale IT has been the increasing use of business-to-business integration (B2Bi) technologies to automate business processes that cross organisati...
Dean Kuo, Alan Fekete, Paul Greenfield, Julian Jan...
123
Voted
DATE
2003
IEEE
101views Hardware» more  DATE 2003»
15 years 9 months ago
Energy Estimation for Extensible Processors
This paper presents an efficient methodology for estimating the energy consumption of application programs running on extensible processors. Extensible processors, which are incr...
Yunsi Fei, Srivaths Ravi, Anand Raghunathan, Niraj...
« Prev « First page 2136 / 2315 Last » Next »