Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
Sci2ools
International Keyboard
Graphical Social Symbols
CSS3 Style Generator
OCR
Web Page to Image
Web Page to PDF
Merge PDF
Split PDF
Latex Equation Editor
Extract Images from PDF
Convert JPEG to PS
Convert Latex to Word
Convert Word to PDF
Image Converter
PDF Converter
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
2945
search results - page 16 / 589
»
Designing and Implementing Malicious Hardware
Sort
relevance
views
votes
recent
update
View
thumb
title
66
click to vote
SIGMETRICS
2004
ACM
80
views
Hardware
»
more
SIGMETRICS 2004
»
Controlling the performance of 3-tiered web sites: modeling, design and implementation
15 years 5 months ago
Download
dna-pubs.cs.columbia.edu
Abhinav Kamra, Vishal Misra, Erich M. Nahum
claim paper
Read More »
60
click to vote
FPL
2004
Springer
81
views
Hardware
»
more
FPL 2004
»
Design and Implementation of the Memory Scheduler for the PC-Based Router
15 years 5 months ago
Download
www.liberouter.org
Tomás Marek, Martin Novotný, Ludek C...
claim paper
Read More »
44
click to vote
ISCAS
2003
IEEE
72
views
Hardware
»
more
ISCAS 2003
»
Design and implementation of high-speed arbiter for large scale VOQ crossbar switches
15 years 5 months ago
Download
www.cs.ust.hk
Chun Kit Hung, Mounir Hamdi, Chi-Ying Tsui
claim paper
Read More »
72
click to vote
MSS
2003
IEEE
117
views
Hardware
»
more
MSS 2003
»
Design and Implementation of a Storage Repository Using Commonality Factoring
15 years 5 months ago
Download
storageconference.org
Jim Hamilton, Eric W. Olsen
claim paper
Read More »
96
click to vote
ARC
2009
Springer
241
views
Hardware
»
more
ARC 2009
»
Fully Pipelined Hardware Implementation of 128-Bit SEED Block Cipher Algorithm
15 years 6 months ago
Download
escal.yonsei.ac.kr
As the need for information security increases in our everyday life, the job of encoding/decoding for secure information delivery becomes a critical issue in data network systems. ...
Jaeyoung Yi, Karam Park, Joonseok Park, Won Woo Ro
claim paper
Read More »
« Prev
« First
page 16 / 589
Last »
Next »