Sciweavers

3630 search results - page 34 / 726
» How to Compare Treebanks
Sort
View
CHES
2010
Springer
141views Cryptology» more  CHES 2010»
14 years 11 months ago
Fair and Comprehensive Methodology for Comparing Hardware Performance of Fourteen Round Two SHA-3 Candidates Using FPGAs
Performance in hardware has been demonstrated to be an important factor in the evaluation of candidates for cryptographic standards. Up to now, no consensus exists on how such an e...
Kris Gaj, Ekawat Homsirikamol, Marcin Rogawski
COMPSEC
2006
141views more  COMPSEC 2006»
14 years 10 months ago
Comparing Java and .NET security: Lessons learned and missed
Many systems execute untrusted programs in virtual machines (VMs) to limit their access to system resources. Sun introduced the Java VM in 1995, primarily intended as a lightweigh...
Nathanael Paul, David Evans
DM
2006
63views more  DM 2006»
14 years 10 months ago
Efficient crossover designs for comparing test treatments with a control treatment
Within a large family of crossover designs this paper characterizes the mathematical structures of A-optimal and A-efficient crossover designs for the purpose of statistical compa...
A. Sadam Hedayat, Min Yang
ENTCS
2002
144views more  ENTCS 2002»
14 years 9 months ago
Comparative Analysis of Architectural Views Based on UML
The need to model systems and their different aspects leads to research and development of models which support all views of a system. The growing complexity of the software impos...
Lyrene Fernandes da Silva, Virginia C. Carneiro de...
ENTCS
2008
97views more  ENTCS 2008»
14 years 8 months ago
Coordination Models Orc and Reo Compared
Orc and Reo are two complementary approaches to the problem of coordinating components or services. On one hand, Orc is highly asynchronous, naturally dynamic, and based on epheme...
José Proença, Dave Clarke