Sciweavers

4139 search results - page 291 / 828
» Designing and Implementing Combinator Languages
Sort
View
145
Voted
FSE
2004
Springer
123views Cryptology» more  FSE 2004»
15 years 8 months ago
ICEBERG : An Involutional Cipher Efficient for Block Encryption in Reconfigurable Hardware
Abstract. We present a fast involutional block cipher optimized for reconfigurable hardware implementations. ICEBERG uses 64-bit text blocks and 128-bit keys. All components are in...
François-Xavier Standaert, Gilles Piret, Ga...
DELTA
2010
IEEE
15 years 10 months ago
Notations for Multiphase Pipelines
— FPGAs, (Field-Programmable Gate Arrays) are often used for embedded image processing applications. Parallelism, and in particular pipelining, is the most suitable architecture ...
Christopher T. Johnston, Donald G. Bailey, Paul J....
135
Voted
ECOOP
2005
Springer
15 years 10 months ago
Evaluating Support for Features in Advanced Modularization Technologies
Abstract. A software product-line is a family of related programs. Each program is defined by a unique combination of features, where a feature is an increment in program functiona...
Roberto E. Lopez-Herrejon, Don S. Batory, William ...
PLDI
2003
ACM
15 years 10 months ago
Optimizing indirect branch prediction accuracy in virtual machine interpreters
Interpreters designed for efficiency execute a huge number of indirect branches and can spend more than half of the execution time in indirect branch mispredictions. Branch target...
M. Anton Ertl, David Gregg
139
Voted
EUSFLAT
2003
110views Fuzzy Logic» more  EUSFLAT 2003»
15 years 6 months ago
Fuzzy-neuro risk assessment of distributed real-time systems through formal and object-oriented systems modelling
The purpose of this paper is to advocate and encourage the application of fuzzy-neuro algorithms in the risk assessment of Distributed Real-Time (DRT) systems, where object-orient...
Atoosa P.-J. Thunem