Sciweavers

1170 search results - page 141 / 234
» How Fast Is Too Fast
Sort
View
140
Voted
SIGUCCS
2003
ACM
15 years 8 months ago
Making online training and support easier for everyone with viewlets
Online training and support objects can be difficult and timeconsuming to create. Written words are often ignored by users who want someone to show them a procedure. Viewlets are ...
Janice Ward
DATE
2002
IEEE
144views Hardware» more  DATE 2002»
15 years 8 months ago
Design Automation for Deepsubmicron: Present and Future
Advancing technology drives design technology and thus design automation EDA. How to model interconnect, how to handle degradation of signal integrity and increasing power densi...
Ralph H. J. M. Otten, Raul Camposano, Patrick Groe...
BTW
2007
Springer
133views Database» more  BTW 2007»
15 years 7 months ago
Pathfinder: XQuery Compila-tion Techniques for Relational Database Targets
: Relational database systems are highly efficient hosts to table-shaped data. It is all the more interesting to see how a careful inspection of both, the XML tree structure as wel...
Jens Teubner
CIE
2006
Springer
15 years 7 months ago
Forcing with Random Variables and Proof Complexity
or representation theory of groups), and even borrows abstract geometrical concepts like Euler characteristic or Grothendieck ring. However, the most stimulating for proof complexi...
Jan Krajícek
171
Voted
CTRSA
2006
Springer
183views Cryptology» more  CTRSA 2006»
15 years 7 months ago
Efficient Doubling on Genus 3 Curves over Binary Fields
The most important and expensive operation in a hyperelliptic curve cryptosystem (HECC) is scalar multiplication by an integer k, i.e., computing an integer k times a divisor D on ...
Xinxin Fan, Thomas J. Wollinger, Yumin Wang