Sciweavers

1402 search results - page 240 / 281
» Distributed Integrity Checking for Systems with Replicated D...
Sort
View
CIT
2006
Springer
15 years 3 months ago
A new collision resistant hash function based on optimum dimensionality reduction using Walsh-Hadamard transform
Hash functions play the most important role in various cryptologic applications, ranging from data integrity checking to digital signatures. Our goal is to introduce a new hash fu...
Barzan Mozafari, Mohammad Hasan Savoji
UML
1999
Springer
15 years 4 months ago
Closing the Gap Between Object-Oriented Modeling of Structure and Behavior
The UML as standardized language for visual object-oriented modeling allows to capture the requirements as well as the structure and behavior of complex software systems. With the ...
Holger Giese, Jörg Graf, Guido Wirtz
DATE
2005
IEEE
154views Hardware» more  DATE 2005»
15 years 5 months ago
Secure Embedded Processing through Hardware-Assisted Run-Time Monitoring
— Security is emerging as an important concern in embedded system design. The security of embedded systems is often compromised due to vulnerabilities in “trusted” software t...
Divya Arora, Srivaths Ravi, Anand Raghunathan, Nir...
GRAPHICSINTERFACE
2007
15 years 1 months ago
Wavelet encoding of BRDFs for real-time rendering
Acquired data often provides the best knowledge of a material’s bidirectional reflectance distribution function (BRDF). Its integration into most real-time rendering systems re...
Luc Claustres, Loïc Barthe, Mathias Paulin
XPU
2004
Springer
15 years 5 months ago
An Agile Approach to a Legacy System
We describe how a small, successful, self-selected XP team approached a seemingly intractable problem with panache, flair and immodesty. We rewrote a legacy application by deliver...
Chris Stevenson, Andy Pols